[ 56.026127][ T26] audit: type=1400 audit(1674060605.870:69): avc: denied { read write } for pid=4737 comm="getty" name="utmp" dev="tmpfs" ino=2 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 56.048495][ T26] audit: type=1400 audit(1674060605.880:70): avc: denied { open } for pid=4737 comm="getty" path="/run/utmp" dev="tmpfs" ino=2 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 56.071221][ T26] audit: type=1400 audit(1674060605.880:71): avc: denied { lock } for pid=4737 comm="getty" path="/run/utmp" dev="tmpfs" ino=2 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 56.093636][ T26] audit: type=1400 audit(1674060605.880:72): avc: denied { read } for pid=4737 comm="getty" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 syzkaller syzkaller login: [ 67.656625][ T26] audit: type=1400 audit(1674060617.510:73): avc: denied { transition } for pid=4877 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 67.688166][ T26] audit: type=1400 audit(1674060617.510:74): avc: denied { write } for pid=4877 comm="sh" path="pipe:[29720]" dev="pipefs" ino=29720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.0.218' (ECDSA) to the list of known hosts. 2023/01/18 16:50:31 fuzzer started 2023/01/18 16:50:31 dialing manager at 10.128.0.169:44243 [ 88.341604][ T26] audit: type=1400 audit(1674060638.200:75): avc: denied { mounton } for pid=5055 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 88.351309][ T5055] cgroup: Unknown subsys name 'net' [ 88.370184][ T26] audit: type=1400 audit(1674060638.200:76): avc: denied { mount } for pid=5055 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 88.393718][ T26] audit: type=1400 audit(1674060638.230:77): avc: denied { unmount } for pid=5055 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 88.543170][ T5055] cgroup: Unknown subsys name 'rlimit' [ 88.672213][ T26] audit: type=1400 audit(1674060638.530:78): avc: denied { mounton } for pid=5055 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 88.697553][ T26] audit: type=1400 audit(1674060638.530:79): avc: denied { mount } for pid=5055 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2023/01/18 16:50:38 syscalls: 3781 2023/01/18 16:50:38 code coverage: enabled 2023/01/18 16:50:38 comparison tracing: enabled 2023/01/18 16:50:38 extra coverage: enabled 2023/01/18 16:50:38 delay kcov mmap: enabled 2023/01/18 16:50:38 setuid sandbox: enabled 2023/01/18 16:50:38 namespace sandbox: enabled 2023/01/18 16:50:38 Android sandbox: enabled 2023/01/18 16:50:38 fault injection: enabled 2023/01/18 16:50:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2023/01/18 16:50:38 net packet injection: enabled 2023/01/18 16:50:38 net device setup: enabled 2023/01/18 16:50:38 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2023/01/18 16:50:38 devlink PCI setup: PCI device 0000:00:10.0 is not available 2023/01/18 16:50:38 NIC VF setup: PCI device 0000:00:11.0 is not available 2023/01/18 16:50:38 USB emulation: enabled 2023/01/18 16:50:38 hci packet injection: enabled 2023/01/18 16:50:38 wifi device emulation: enabled 2023/01/18 16:50:38 802.15.4 emulation: enabled 2023/01/18 16:50:38 fetching corpus: 0, signal 0/2000 (executing program) [ 88.721923][ T26] audit: type=1400 audit(1674060638.530:80): avc: denied { setattr } for pid=5055 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.747600][ T26] audit: type=1400 audit(1674060638.530:81): avc: denied { create } for pid=5055 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.768704][ T26] audit: type=1400 audit(1674060638.530:82): avc: denied { write } for pid=5055 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.790217][ T26] audit: type=1400 audit(1674060638.530:83): avc: denied { read } for pid=5055 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 2023/01/18 16:50:38 fetching corpus: 50, signal 51356/55205 (executing program) 2023/01/18 16:50:39 fetching corpus: 100, signal 71665/77308 (executing program) 2023/01/18 16:50:39 fetching corpus: 150, signal 95289/102612 (executing program) 2023/01/18 16:50:39 fetching corpus: 200, signal 114626/123640 (executing program) 2023/01/18 16:50:39 fetching corpus: 250, signal 125705/136395 (executing program) 2023/01/18 16:50:40 fetching corpus: 300, signal 135936/148271 (executing program) 2023/01/18 16:50:40 fetching corpus: 350, signal 144800/158759 (executing program) 2023/01/18 16:50:40 fetching corpus: 400, signal 152925/168491 (executing program) 2023/01/18 16:50:40 fetching corpus: 450, signal 158461/175644 (executing program) 2023/01/18 16:50:40 fetching corpus: 500, signal 165693/184463 (executing program) 2023/01/18 16:50:41 fetching corpus: 550, signal 173689/194007 (executing program) 2023/01/18 16:50:41 fetching corpus: 600, signal 181500/203317 (executing program) 2023/01/18 16:50:41 fetching corpus: 650, signal 187424/210780 (executing program) [ 91.614117][ T6] cfg80211: failed to load regulatory.db 2023/01/18 16:50:41 fetching corpus: 700, signal 194572/219395 (executing program) 2023/01/18 16:50:41 fetching corpus: 750, signal 198183/224536 (executing program) 2023/01/18 16:50:41 fetching corpus: 800, signal 204063/231906 (executing program) 2023/01/18 16:50:42 fetching corpus: 850, signal 209302/238603 (executing program) 2023/01/18 16:50:42 fetching corpus: 900, signal 216874/247556 (executing program) 2023/01/18 16:50:42 fetching corpus: 950, signal 222181/254302 (executing program) 2023/01/18 16:50:42 fetching corpus: 1000, signal 227107/260660 (executing program) 2023/01/18 16:50:43 fetching corpus: 1050, signal 233156/268107 (executing program) 2023/01/18 16:50:43 fetching corpus: 1100, signal 236282/272711 (executing program) 2023/01/18 16:50:43 fetching corpus: 1150, signal 240523/278332 (executing program) 2023/01/18 16:50:43 fetching corpus: 1200, signal 246368/285505 (executing program) 2023/01/18 16:50:43 fetching corpus: 1250, signal 253111/293478 (executing program) 2023/01/18 16:50:44 fetching corpus: 1300, signal 259164/300817 (executing program) 2023/01/18 16:50:44 fetching corpus: 1350, signal 263095/306121 (executing program) 2023/01/18 16:50:44 fetching corpus: 1400, signal 267237/311583 (executing program) 2023/01/18 16:50:44 fetching corpus: 1450, signal 272272/317865 (executing program) 2023/01/18 16:50:44 fetching corpus: 1500, signal 276859/323721 (executing program) 2023/01/18 16:50:45 fetching corpus: 1550, signal 280619/328767 (executing program) 2023/01/18 16:50:45 fetching corpus: 1600, signal 283805/333270 (executing program) 2023/01/18 16:50:45 fetching corpus: 1650, signal 287709/338469 (executing program) 2023/01/18 16:50:45 fetching corpus: 1700, signal 291088/343154 (executing program) 2023/01/18 16:50:46 fetching corpus: 1750, signal 294696/348019 (executing program) 2023/01/18 16:50:46 fetching corpus: 1800, signal 296814/351487 (executing program) 2023/01/18 16:50:46 fetching corpus: 1850, signal 300528/356408 (executing program) 2023/01/18 16:50:46 fetching corpus: 1900, signal 303242/360396 (executing program) 2023/01/18 16:50:46 fetching corpus: 1950, signal 305780/364258 (executing program) 2023/01/18 16:50:46 fetching corpus: 2000, signal 308733/368444 (executing program) 2023/01/18 16:50:47 fetching corpus: 2050, signal 311118/372123 (executing program) 2023/01/18 16:50:47 fetching corpus: 2100, signal 312978/375322 (executing program) 2023/01/18 16:50:47 fetching corpus: 2150, signal 315870/379439 (executing program) 2023/01/18 16:50:47 fetching corpus: 2200, signal 318588/383380 (executing program) 2023/01/18 16:50:47 fetching corpus: 2250, signal 321201/387205 (executing program) 2023/01/18 16:50:48 fetching corpus: 2300, signal 323757/390966 (executing program) 2023/01/18 16:50:48 fetching corpus: 2350, signal 326094/394560 (executing program) 2023/01/18 16:50:48 fetching corpus: 2400, signal 329596/399168 (executing program) 2023/01/18 16:50:48 fetching corpus: 2450, signal 332482/403256 (executing program) 2023/01/18 16:50:48 fetching corpus: 2500, signal 335609/407515 (executing program) 2023/01/18 16:50:48 fetching corpus: 2550, signal 336920/410054 (executing program) 2023/01/18 16:50:49 fetching corpus: 2600, signal 339070/413396 (executing program) 2023/01/18 16:50:49 fetching corpus: 2650, signal 341544/417008 (executing program) 2023/01/18 16:50:49 fetching corpus: 2700, signal 345395/421908 (executing program) 2023/01/18 16:50:49 fetching corpus: 2750, signal 348470/426073 (executing program) 2023/01/18 16:50:49 fetching corpus: 2800, signal 350778/429550 (executing program) 2023/01/18 16:50:50 fetching corpus: 2850, signal 354502/434220 (executing program) 2023/01/18 16:50:50 fetching corpus: 2900, signal 357216/438025 (executing program) 2023/01/18 16:50:50 fetching corpus: 2950, signal 359793/441709 (executing program) 2023/01/18 16:50:50 fetching corpus: 3000, signal 361335/444461 (executing program) 2023/01/18 16:50:50 fetching corpus: 3050, signal 363311/447577 (executing program) 2023/01/18 16:50:51 fetching corpus: 3100, signal 365773/451136 (executing program) 2023/01/18 16:50:51 fetching corpus: 3150, signal 368167/454609 (executing program) 2023/01/18 16:50:51 fetching corpus: 3200, signal 370580/458089 (executing program) 2023/01/18 16:50:51 fetching corpus: 3250, signal 372628/461212 (executing program) 2023/01/18 16:50:51 fetching corpus: 3300, signal 374881/464596 (executing program) 2023/01/18 16:50:52 fetching corpus: 3350, signal 378270/468868 (executing program) 2023/01/18 16:50:52 fetching corpus: 3400, signal 380073/471791 (executing program) 2023/01/18 16:50:52 fetching corpus: 3450, signal 382183/474994 (executing program) 2023/01/18 16:50:52 fetching corpus: 3500, signal 384227/478069 (executing program) 2023/01/18 16:50:52 fetching corpus: 3550, signal 386478/481302 (executing program) 2023/01/18 16:50:53 fetching corpus: 3600, signal 388568/484428 (executing program) 2023/01/18 16:50:53 fetching corpus: 3650, signal 390634/487540 (executing program) 2023/01/18 16:50:53 fetching corpus: 3700, signal 392248/490293 (executing program) 2023/01/18 16:50:53 fetching corpus: 3750, signal 393755/492892 (executing program) 2023/01/18 16:50:53 fetching corpus: 3800, signal 396289/496398 (executing program) 2023/01/18 16:50:53 fetching corpus: 3850, signal 398484/499587 (executing program) 2023/01/18 16:50:54 fetching corpus: 3900, signal 399836/502042 (executing program) 2023/01/18 16:50:54 fetching corpus: 3950, signal 401614/504850 (executing program) 2023/01/18 16:50:54 fetching corpus: 4000, signal 404022/508181 (executing program) 2023/01/18 16:50:54 fetching corpus: 4050, signal 405555/510850 (executing program) 2023/01/18 16:50:55 fetching corpus: 4100, signal 408161/514353 (executing program) 2023/01/18 16:50:55 fetching corpus: 4150, signal 410619/517723 (executing program) 2023/01/18 16:50:55 fetching corpus: 4200, signal 412768/520782 (executing program) 2023/01/18 16:50:55 fetching corpus: 4250, signal 415194/524121 (executing program) 2023/01/18 16:50:55 fetching corpus: 4300, signal 416291/526276 (executing program) 2023/01/18 16:50:55 fetching corpus: 4350, signal 418477/529368 (executing program) 2023/01/18 16:50:56 fetching corpus: 4400, signal 419805/531699 (executing program) 2023/01/18 16:50:56 fetching corpus: 4450, signal 422174/534915 (executing program) 2023/01/18 16:50:56 fetching corpus: 4500, signal 423366/537204 (executing program) 2023/01/18 16:50:56 fetching corpus: 4550, signal 424991/539752 (executing program) 2023/01/18 16:50:56 fetching corpus: 4600, signal 427146/542769 (executing program) 2023/01/18 16:50:57 fetching corpus: 4650, signal 429276/545829 (executing program) 2023/01/18 16:50:57 fetching corpus: 4700, signal 431166/548618 (executing program) 2023/01/18 16:50:57 fetching corpus: 4750, signal 433025/551431 (executing program) 2023/01/18 16:50:57 fetching corpus: 4800, signal 434630/553959 (executing program) 2023/01/18 16:50:57 fetching corpus: 4850, signal 437018/557163 (executing program) 2023/01/18 16:50:58 fetching corpus: 4900, signal 438814/559868 (executing program) 2023/01/18 16:50:58 fetching corpus: 4950, signal 440590/562554 (executing program) 2023/01/18 16:50:58 fetching corpus: 5000, signal 442482/565330 (executing program) 2023/01/18 16:50:58 fetching corpus: 5050, signal 443751/567633 (executing program) 2023/01/18 16:50:59 fetching corpus: 5100, signal 445260/570077 (executing program) 2023/01/18 16:50:59 fetching corpus: 5150, signal 446799/572568 (executing program) 2023/01/18 16:50:59 fetching corpus: 5200, signal 448383/575111 (executing program) 2023/01/18 16:50:59 fetching corpus: 5250, signal 449917/577561 (executing program) 2023/01/18 16:50:59 fetching corpus: 5300, signal 450911/579568 (executing program) 2023/01/18 16:51:00 fetching corpus: 5350, signal 453626/582963 (executing program) 2023/01/18 16:51:00 fetching corpus: 5400, signal 455036/585319 (executing program) 2023/01/18 16:51:00 fetching corpus: 5450, signal 456419/587660 (executing program) 2023/01/18 16:51:00 fetching corpus: 5500, signal 458310/590383 (executing program) 2023/01/18 16:51:00 fetching corpus: 5550, signal 460263/593145 (executing program) 2023/01/18 16:51:01 fetching corpus: 5600, signal 461723/595517 (executing program) 2023/01/18 16:51:01 fetching corpus: 5650, signal 462858/597592 (executing program) 2023/01/18 16:51:01 fetching corpus: 5700, signal 463892/599619 (executing program) 2023/01/18 16:51:01 fetching corpus: 5750, signal 465111/601744 (executing program) 2023/01/18 16:51:01 fetching corpus: 5800, signal 466700/604155 (executing program) 2023/01/18 16:51:01 fetching corpus: 5850, signal 467919/606314 (executing program) 2023/01/18 16:51:02 fetching corpus: 5900, signal 469217/608505 (executing program) 2023/01/18 16:51:02 fetching corpus: 5950, signal 470038/610339 (executing program) 2023/01/18 16:51:02 fetching corpus: 6000, signal 471336/612483 (executing program) 2023/01/18 16:51:02 fetching corpus: 6050, signal 472518/614520 (executing program) 2023/01/18 16:51:02 fetching corpus: 6100, signal 473480/616444 (executing program) 2023/01/18 16:51:03 fetching corpus: 6150, signal 474665/618495 (executing program) 2023/01/18 16:51:03 fetching corpus: 6200, signal 476307/620919 (executing program) 2023/01/18 16:51:03 fetching corpus: 6250, signal 477380/622921 (executing program) 2023/01/18 16:51:03 fetching corpus: 6300, signal 478999/625343 (executing program) 2023/01/18 16:51:03 fetching corpus: 6350, signal 480386/627575 (executing program) 2023/01/18 16:51:04 fetching corpus: 6400, signal 482400/630335 (executing program) 2023/01/18 16:51:04 fetching corpus: 6450, signal 483362/632208 (executing program) 2023/01/18 16:51:04 fetching corpus: 6500, signal 485008/634650 (executing program) 2023/01/18 16:51:04 fetching corpus: 6550, signal 486225/636773 (executing program) 2023/01/18 16:51:04 fetching corpus: 6600, signal 488015/639265 (executing program) 2023/01/18 16:51:04 fetching corpus: 6650, signal 488996/641161 (executing program) 2023/01/18 16:51:05 fetching corpus: 6700, signal 490245/643188 (executing program) 2023/01/18 16:51:05 fetching corpus: 6750, signal 491650/645395 (executing program) 2023/01/18 16:51:05 fetching corpus: 6800, signal 493336/647808 (executing program) 2023/01/18 16:51:05 fetching corpus: 6850, signal 494754/649999 (executing program) 2023/01/18 16:51:05 fetching corpus: 6900, signal 496364/652369 (executing program) 2023/01/18 16:51:06 fetching corpus: 6950, signal 497998/654726 (executing program) 2023/01/18 16:51:06 fetching corpus: 7000, signal 499167/656674 (executing program) 2023/01/18 16:51:06 fetching corpus: 7050, signal 500275/658659 (executing program) 2023/01/18 16:51:06 fetching corpus: 7100, signal 501459/660621 (executing program) 2023/01/18 16:51:06 fetching corpus: 7150, signal 503387/663098 (executing program) 2023/01/18 16:51:06 fetching corpus: 7200, signal 504248/664844 (executing program) 2023/01/18 16:51:07 fetching corpus: 7250, signal 505578/666939 (executing program) 2023/01/18 16:51:07 fetching corpus: 7300, signal 508349/670086 (executing program) 2023/01/18 16:51:07 fetching corpus: 7350, signal 509266/671830 (executing program) 2023/01/18 16:51:07 fetching corpus: 7400, signal 510520/673854 (executing program) 2023/01/18 16:51:08 fetching corpus: 7450, signal 511834/675873 (executing program) 2023/01/18 16:51:08 fetching corpus: 7500, signal 512818/677728 (executing program) 2023/01/18 16:51:08 fetching corpus: 7550, signal 514367/679942 (executing program) 2023/01/18 16:51:08 fetching corpus: 7600, signal 515548/681876 (executing program) 2023/01/18 16:51:08 fetching corpus: 7650, signal 516353/683542 (executing program) 2023/01/18 16:51:09 fetching corpus: 7700, signal 517670/685555 (executing program) 2023/01/18 16:51:09 fetching corpus: 7750, signal 518849/687459 (executing program) 2023/01/18 16:51:09 fetching corpus: 7800, signal 519557/689035 (executing program) 2023/01/18 16:51:09 fetching corpus: 7850, signal 520614/690843 (executing program) 2023/01/18 16:51:09 fetching corpus: 7900, signal 521796/692789 (executing program) 2023/01/18 16:51:10 fetching corpus: 7950, signal 523275/694908 (executing program) 2023/01/18 16:51:10 fetching corpus: 8000, signal 524412/696790 (executing program) 2023/01/18 16:51:10 fetching corpus: 8050, signal 525533/698638 (executing program) 2023/01/18 16:51:10 fetching corpus: 8100, signal 526665/700547 (executing program) 2023/01/18 16:51:10 fetching corpus: 8150, signal 527702/702371 (executing program) 2023/01/18 16:51:11 fetching corpus: 8200, signal 529019/704362 (executing program) 2023/01/18 16:51:11 fetching corpus: 8250, signal 530112/706171 (executing program) 2023/01/18 16:51:11 fetching corpus: 8300, signal 531578/708205 (executing program) 2023/01/18 16:51:11 fetching corpus: 8350, signal 532308/709807 (executing program) 2023/01/18 16:51:11 fetching corpus: 8400, signal 533016/711352 (executing program) 2023/01/18 16:51:11 fetching corpus: 8450, signal 534029/713152 (executing program) 2023/01/18 16:51:12 fetching corpus: 8500, signal 534944/714850 (executing program) 2023/01/18 16:51:12 fetching corpus: 8550, signal 535699/716395 (executing program) 2023/01/18 16:51:12 fetching corpus: 8600, signal 536727/718150 (executing program) 2023/01/18 16:51:12 fetching corpus: 8650, signal 538049/720072 (executing program) 2023/01/18 16:51:12 fetching corpus: 8700, signal 539636/722252 (executing program) 2023/01/18 16:51:13 fetching corpus: 8750, signal 541213/724406 (executing program) 2023/01/18 16:51:13 fetching corpus: 8800, signal 542397/726226 (executing program) 2023/01/18 16:51:13 fetching corpus: 8850, signal 543575/728076 (executing program) 2023/01/18 16:51:13 fetching corpus: 8900, signal 544596/729830 (executing program) 2023/01/18 16:51:13 fetching corpus: 8950, signal 545528/731530 (executing program) 2023/01/18 16:51:14 fetching corpus: 9000, signal 546653/733353 (executing program) 2023/01/18 16:51:14 fetching corpus: 9050, signal 547403/734916 (executing program) 2023/01/18 16:51:14 fetching corpus: 9100, signal 548173/736469 (executing program) 2023/01/18 16:51:14 fetching corpus: 9150, signal 549295/738284 (executing program) 2023/01/18 16:51:14 fetching corpus: 9200, signal 550046/739794 (executing program) 2023/01/18 16:51:14 fetching corpus: 9250, signal 551214/741619 (executing program) 2023/01/18 16:51:15 fetching corpus: 9300, signal 552655/743593 (executing program) 2023/01/18 16:51:15 fetching corpus: 9350, signal 553407/745098 (executing program) 2023/01/18 16:51:15 fetching corpus: 9400, signal 554345/746760 (executing program) 2023/01/18 16:51:15 fetching corpus: 9450, signal 555241/748342 (executing program) 2023/01/18 16:51:15 fetching corpus: 9500, signal 556236/750056 (executing program) 2023/01/18 16:51:15 fetching corpus: 9550, signal 557085/751621 (executing program) 2023/01/18 16:51:16 fetching corpus: 9600, signal 558358/753494 (executing program) 2023/01/18 16:51:16 fetching corpus: 9650, signal 559131/755016 (executing program) 2023/01/18 16:51:16 fetching corpus: 9700, signal 560229/756729 (executing program) 2023/01/18 16:51:16 fetching corpus: 9750, signal 561953/758858 (executing program) 2023/01/18 16:51:16 fetching corpus: 9800, signal 562789/760432 (executing program) 2023/01/18 16:51:17 fetching corpus: 9850, signal 564037/762243 (executing program) 2023/01/18 16:51:17 fetching corpus: 9900, signal 564980/763905 (executing program) 2023/01/18 16:51:17 fetching corpus: 9950, signal 565848/765484 (executing program) 2023/01/18 16:51:17 fetching corpus: 10000, signal 567291/767420 (executing program) 2023/01/18 16:51:17 fetching corpus: 10050, signal 568249/769021 (executing program) 2023/01/18 16:51:18 fetching corpus: 10100, signal 569170/770607 (executing program) 2023/01/18 16:51:18 fetching corpus: 10150, signal 570532/772451 (executing program) 2023/01/18 16:51:18 fetching corpus: 10200, signal 571910/774301 (executing program) 2023/01/18 16:51:18 fetching corpus: 10250, signal 572630/775732 (executing program) 2023/01/18 16:51:18 fetching corpus: 10300, signal 573528/777253 (executing program) 2023/01/18 16:51:19 fetching corpus: 10350, signal 574314/778730 (executing program) 2023/01/18 16:51:19 fetching corpus: 10400, signal 575092/780218 (executing program) 2023/01/18 16:51:19 fetching corpus: 10450, signal 576133/781856 (executing program) 2023/01/18 16:51:19 fetching corpus: 10500, signal 577225/783518 (executing program) 2023/01/18 16:51:20 fetching corpus: 10550, signal 578402/785201 (executing program) 2023/01/18 16:51:20 fetching corpus: 10600, signal 579778/787102 (executing program) 2023/01/18 16:51:20 fetching corpus: 10650, signal 580903/788785 (executing program) 2023/01/18 16:51:20 fetching corpus: 10700, signal 581546/790174 (executing program) 2023/01/18 16:51:20 fetching corpus: 10750, signal 582349/791640 (executing program) 2023/01/18 16:51:20 fetching corpus: 10800, signal 583051/793052 (executing program) 2023/01/18 16:51:21 fetching corpus: 10850, signal 584585/794953 (executing program) 2023/01/18 16:51:21 fetching corpus: 10900, signal 585536/796478 (executing program) 2023/01/18 16:51:21 fetching corpus: 10950, signal 586306/797898 (executing program) 2023/01/18 16:51:21 fetching corpus: 11000, signal 587106/799338 (executing program) 2023/01/18 16:51:21 fetching corpus: 11050, signal 587836/800713 (executing program) 2023/01/18 16:51:22 fetching corpus: 11100, signal 588759/802218 (executing program) 2023/01/18 16:51:22 fetching corpus: 11150, signal 589541/803676 (executing program) 2023/01/18 16:51:22 fetching corpus: 11200, signal 590699/805367 (executing program) 2023/01/18 16:51:23 fetching corpus: 11250, signal 591395/806708 (executing program) 2023/01/18 16:51:23 fetching corpus: 11300, signal 592216/808165 (executing program) 2023/01/18 16:51:23 fetching corpus: 11350, signal 593277/809731 (executing program) 2023/01/18 16:51:23 fetching corpus: 11400, signal 594069/811138 (executing program) 2023/01/18 16:51:23 fetching corpus: 11450, signal 594700/812463 (executing program) 2023/01/18 16:51:24 fetching corpus: 11500, signal 595922/814173 (executing program) 2023/01/18 16:51:24 fetching corpus: 11550, signal 596836/815636 (executing program) 2023/01/18 16:51:24 fetching corpus: 11600, signal 597497/816971 (executing program) 2023/01/18 16:51:24 fetching corpus: 11650, signal 598273/818358 (executing program) 2023/01/18 16:51:24 fetching corpus: 11700, signal 598963/819701 (executing program) 2023/01/18 16:51:25 fetching corpus: 11750, signal 599658/821054 (executing program) 2023/01/18 16:51:25 fetching corpus: 11800, signal 600442/822432 (executing program) 2023/01/18 16:51:25 fetching corpus: 11850, signal 601059/823736 (executing program) 2023/01/18 16:51:25 fetching corpus: 11900, signal 601884/825158 (executing program) 2023/01/18 16:51:25 fetching corpus: 11950, signal 602713/826608 (executing program) 2023/01/18 16:51:26 fetching corpus: 12000, signal 609124/831186 (executing program) 2023/01/18 16:51:26 fetching corpus: 12050, signal 610295/832813 (executing program) 2023/01/18 16:51:26 fetching corpus: 12100, signal 611014/834148 (executing program) 2023/01/18 16:51:26 fetching corpus: 12150, signal 612671/836011 (executing program) 2023/01/18 16:51:26 fetching corpus: 12200, signal 613704/837507 (executing program) 2023/01/18 16:51:26 fetching corpus: 12250, signal 614853/839117 (executing program) 2023/01/18 16:51:27 fetching corpus: 12300, signal 615330/840256 (executing program) 2023/01/18 16:51:27 fetching corpus: 12350, signal 615805/841389 (executing program) 2023/01/18 16:51:27 fetching corpus: 12400, signal 616602/842727 (executing program) [ 137.694238][ T1210] ieee802154 phy0 wpan0: encryption failed: -22 [ 137.700940][ T1210] ieee802154 phy1 wpan1: encryption failed: -22 2023/01/18 16:51:27 fetching corpus: 12450, signal 617645/844164 (executing program) 2023/01/18 16:51:27 fetching corpus: 12500, signal 618138/845317 (executing program) 2023/01/18 16:51:28 fetching corpus: 12550, signal 618810/846601 (executing program) 2023/01/18 16:51:28 fetching corpus: 12600, signal 619426/847870 (executing program) 2023/01/18 16:51:28 fetching corpus: 12650, signal 620096/849125 (executing program) 2023/01/18 16:51:28 fetching corpus: 12700, signal 620589/850300 (executing program) 2023/01/18 16:51:28 fetching corpus: 12750, signal 621378/851687 (executing program) 2023/01/18 16:51:29 fetching corpus: 12800, signal 622681/853320 (executing program) 2023/01/18 16:51:29 fetching corpus: 12850, signal 623274/854519 (executing program) 2023/01/18 16:51:29 fetching corpus: 12900, signal 624274/855924 (executing program) 2023/01/18 16:51:29 fetching corpus: 12950, signal 625311/857353 (executing program) 2023/01/18 16:51:30 fetching corpus: 13000, signal 626088/858626 (executing program) 2023/01/18 16:51:30 fetching corpus: 13050, signal 626807/859905 (executing program) 2023/01/18 16:51:30 fetching corpus: 13100, signal 627662/861247 (executing program) 2023/01/18 16:51:30 fetching corpus: 13150, signal 628721/862695 (executing program) 2023/01/18 16:51:30 fetching corpus: 13200, signal 629374/863951 (executing program) 2023/01/18 16:51:31 fetching corpus: 13250, signal 630256/865278 (executing program) 2023/01/18 16:51:31 fetching corpus: 13300, signal 631049/866537 (executing program) 2023/01/18 16:51:31 fetching corpus: 13350, signal 631780/867797 (executing program) 2023/01/18 16:51:31 fetching corpus: 13400, signal 633033/869323 (executing program) 2023/01/18 16:51:32 fetching corpus: 13450, signal 633825/870570 (executing program) 2023/01/18 16:51:32 fetching corpus: 13500, signal 634653/871914 (executing program) 2023/01/18 16:51:32 fetching corpus: 13550, signal 635387/873188 (executing program) 2023/01/18 16:51:32 fetching corpus: 13599, signal 636096/874460 (executing program) 2023/01/18 16:51:32 fetching corpus: 13649, signal 636774/875664 (executing program) 2023/01/18 16:51:33 fetching corpus: 13699, signal 637538/876962 (executing program) 2023/01/18 16:51:33 fetching corpus: 13749, signal 638159/878151 (executing program) 2023/01/18 16:51:33 fetching corpus: 13799, signal 639019/879513 (executing program) 2023/01/18 16:51:33 fetching corpus: 13849, signal 639842/880754 (executing program) 2023/01/18 16:51:33 fetching corpus: 13899, signal 640599/881967 (executing program) 2023/01/18 16:51:34 fetching corpus: 13949, signal 641251/883136 (executing program) 2023/01/18 16:51:34 fetching corpus: 13999, signal 641882/884338 (executing program) 2023/01/18 16:51:34 fetching corpus: 14049, signal 642836/885703 (executing program) 2023/01/18 16:51:34 fetching corpus: 14099, signal 643539/886917 (executing program) 2023/01/18 16:51:35 fetching corpus: 14149, signal 644315/888158 (executing program) 2023/01/18 16:51:35 fetching corpus: 14199, signal 645389/889582 (executing program) 2023/01/18 16:51:35 fetching corpus: 14249, signal 646199/890845 (executing program) 2023/01/18 16:51:35 fetching corpus: 14299, signal 647012/892070 (executing program) 2023/01/18 16:51:35 fetching corpus: 14349, signal 647637/893213 (executing program) 2023/01/18 16:51:35 fetching corpus: 14399, signal 648493/894450 (executing program) 2023/01/18 16:51:36 fetching corpus: 14449, signal 649175/895634 (executing program) 2023/01/18 16:51:36 fetching corpus: 14499, signal 649685/896728 (executing program) 2023/01/18 16:51:36 fetching corpus: 14549, signal 650536/897952 (executing program) 2023/01/18 16:51:36 fetching corpus: 14599, signal 651245/899144 (executing program) 2023/01/18 16:51:36 fetching corpus: 14649, signal 651763/900257 (executing program) 2023/01/18 16:51:37 fetching corpus: 14699, signal 652374/901414 (executing program) 2023/01/18 16:51:37 fetching corpus: 14749, signal 653009/902518 (executing program) 2023/01/18 16:51:37 fetching corpus: 14799, signal 653597/903629 (executing program) 2023/01/18 16:51:37 fetching corpus: 14849, signal 654544/904930 (executing program) 2023/01/18 16:51:38 fetching corpus: 14899, signal 655140/906110 (executing program) 2023/01/18 16:51:38 fetching corpus: 14949, signal 655935/907269 (executing program) 2023/01/18 16:51:38 fetching corpus: 14999, signal 657261/908714 (executing program) 2023/01/18 16:51:38 fetching corpus: 15049, signal 658087/909914 (executing program) 2023/01/18 16:51:38 fetching corpus: 15099, signal 658785/911049 (executing program) 2023/01/18 16:51:39 fetching corpus: 15149, signal 659214/912071 (executing program) 2023/01/18 16:51:39 fetching corpus: 15199, signal 659947/913249 (executing program) 2023/01/18 16:51:39 fetching corpus: 15249, signal 660889/914498 (executing program) 2023/01/18 16:51:39 fetching corpus: 15298, signal 661300/915498 (executing program) 2023/01/18 16:51:39 fetching corpus: 15348, signal 662115/916666 (executing program) 2023/01/18 16:51:40 fetching corpus: 15398, signal 663261/917968 (executing program) 2023/01/18 16:51:40 fetching corpus: 15448, signal 663676/918948 (executing program) 2023/01/18 16:51:40 fetching corpus: 15498, signal 665021/920349 (executing program) 2023/01/18 16:51:40 fetching corpus: 15548, signal 665824/921523 (executing program) 2023/01/18 16:51:41 fetching corpus: 15598, signal 666400/922638 (executing program) 2023/01/18 16:51:41 fetching corpus: 15648, signal 666933/923669 (executing program) 2023/01/18 16:51:41 fetching corpus: 15698, signal 667507/924694 (executing program) 2023/01/18 16:51:41 fetching corpus: 15748, signal 668126/925722 (executing program) 2023/01/18 16:51:41 fetching corpus: 15798, signal 668751/926824 (executing program) 2023/01/18 16:51:41 fetching corpus: 15848, signal 669235/927845 (executing program) 2023/01/18 16:51:42 fetching corpus: 15898, signal 670255/929075 (executing program) 2023/01/18 16:51:42 fetching corpus: 15947, signal 671550/930477 (executing program) 2023/01/18 16:51:42 fetching corpus: 15997, signal 673120/931932 (executing program) 2023/01/18 16:51:42 fetching corpus: 16046, signal 673810/933055 (executing program) 2023/01/18 16:51:42 fetching corpus: 16096, signal 674824/934303 (executing program) 2023/01/18 16:51:43 fetching corpus: 16146, signal 675768/935492 (executing program) 2023/01/18 16:51:43 fetching corpus: 16196, signal 676478/936589 (executing program) 2023/01/18 16:51:43 fetching corpus: 16246, signal 677482/937815 (executing program) 2023/01/18 16:51:43 fetching corpus: 16296, signal 678321/938963 (executing program) 2023/01/18 16:51:43 fetching corpus: 16346, signal 679075/940045 (executing program) 2023/01/18 16:51:44 fetching corpus: 16396, signal 679765/941175 (executing program) 2023/01/18 16:51:44 fetching corpus: 16446, signal 680219/942146 (executing program) 2023/01/18 16:51:44 fetching corpus: 16496, signal 680707/943163 (executing program) 2023/01/18 16:51:44 fetching corpus: 16546, signal 681335/944259 (executing program) 2023/01/18 16:51:44 fetching corpus: 16596, signal 681855/945266 (executing program) 2023/01/18 16:51:44 fetching corpus: 16646, signal 682520/946303 (executing program) 2023/01/18 16:51:45 fetching corpus: 16696, signal 683278/947408 (executing program) 2023/01/18 16:51:45 fetching corpus: 16746, signal 683871/948396 (executing program) 2023/01/18 16:51:45 fetching corpus: 16796, signal 686353/950153 (executing program) 2023/01/18 16:51:45 fetching corpus: 16846, signal 686970/951206 (executing program) 2023/01/18 16:51:45 fetching corpus: 16896, signal 687569/952247 (executing program) 2023/01/18 16:51:45 fetching corpus: 16946, signal 688197/953215 (executing program) 2023/01/18 16:51:46 fetching corpus: 16996, signal 688712/954195 (executing program) 2023/01/18 16:51:46 fetching corpus: 17046, signal 689485/955252 (executing program) 2023/01/18 16:51:46 fetching corpus: 17096, signal 690244/956393 (executing program) 2023/01/18 16:51:46 fetching corpus: 17146, signal 690681/957383 (executing program) 2023/01/18 16:51:46 fetching corpus: 17196, signal 690987/958300 (executing program) 2023/01/18 16:51:46 fetching corpus: 17246, signal 691810/959418 (executing program) 2023/01/18 16:51:47 fetching corpus: 17296, signal 692603/960567 (executing program) 2023/01/18 16:51:47 fetching corpus: 17346, signal 693165/961528 (executing program) 2023/01/18 16:51:47 fetching corpus: 17396, signal 693814/962524 (executing program) 2023/01/18 16:51:47 fetching corpus: 17446, signal 694419/963545 (executing program) 2023/01/18 16:51:47 fetching corpus: 17496, signal 694985/964564 (executing program) 2023/01/18 16:51:48 fetching corpus: 17546, signal 695502/965525 (executing program) 2023/01/18 16:51:48 fetching corpus: 17596, signal 695865/966442 (executing program) 2023/01/18 16:51:48 fetching corpus: 17646, signal 696531/967450 (executing program) 2023/01/18 16:51:48 fetching corpus: 17696, signal 696930/968376 (executing program) 2023/01/18 16:51:48 fetching corpus: 17746, signal 697578/969345 (executing program) 2023/01/18 16:51:49 fetching corpus: 17796, signal 698124/970270 (executing program) 2023/01/18 16:51:49 fetching corpus: 17846, signal 698979/971383 (executing program) 2023/01/18 16:51:49 fetching corpus: 17896, signal 699482/972337 (executing program) 2023/01/18 16:51:49 fetching corpus: 17946, signal 700036/973292 (executing program) 2023/01/18 16:51:49 fetching corpus: 17996, signal 700317/974124 (executing program) 2023/01/18 16:51:49 fetching corpus: 18046, signal 701678/975361 (executing program) 2023/01/18 16:51:50 fetching corpus: 18096, signal 702221/976334 (executing program) 2023/01/18 16:51:50 fetching corpus: 18146, signal 702757/977260 (executing program) 2023/01/18 16:51:50 fetching corpus: 18196, signal 703242/978235 (executing program) 2023/01/18 16:51:50 fetching corpus: 18246, signal 703811/979172 (executing program) 2023/01/18 16:51:50 fetching corpus: 18296, signal 704624/980175 (executing program) 2023/01/18 16:51:51 fetching corpus: 18346, signal 705302/981122 (executing program) 2023/01/18 16:51:51 fetching corpus: 18396, signal 706203/982174 (executing program) 2023/01/18 16:51:51 fetching corpus: 18446, signal 706813/983121 (executing program) 2023/01/18 16:51:51 fetching corpus: 18496, signal 707225/984028 (executing program) 2023/01/18 16:51:51 fetching corpus: 18546, signal 707717/984941 (executing program) 2023/01/18 16:51:52 fetching corpus: 18596, signal 708752/985987 (executing program) 2023/01/18 16:51:52 fetching corpus: 18645, signal 709195/986839 (executing program) 2023/01/18 16:51:52 fetching corpus: 18695, signal 709714/987799 (executing program) 2023/01/18 16:51:52 fetching corpus: 18745, signal 710242/988721 (executing program) 2023/01/18 16:51:52 fetching corpus: 18795, signal 710751/989664 (executing program) 2023/01/18 16:51:52 fetching corpus: 18845, signal 711206/990557 (executing program) 2023/01/18 16:51:52 fetching corpus: 18895, signal 711753/991492 (executing program) 2023/01/18 16:51:53 fetching corpus: 18945, signal 712328/992404 (executing program) 2023/01/18 16:51:53 fetching corpus: 18995, signal 713424/993491 (executing program) 2023/01/18 16:51:53 fetching corpus: 19045, signal 713972/994377 (executing program) 2023/01/18 16:51:53 fetching corpus: 19095, signal 714781/995311 (executing program) 2023/01/18 16:51:53 fetching corpus: 19145, signal 715610/996337 (executing program) 2023/01/18 16:51:54 fetching corpus: 19195, signal 716126/997257 (executing program) 2023/01/18 16:51:54 fetching corpus: 19245, signal 716743/998174 (executing program) 2023/01/18 16:51:54 fetching corpus: 19294, signal 717128/999012 (executing program) 2023/01/18 16:51:54 fetching corpus: 19344, signal 717587/999918 (executing program) 2023/01/18 16:51:55 fetching corpus: 19394, signal 718157/1000801 (executing program) 2023/01/18 16:51:55 fetching corpus: 19444, signal 718611/1001666 (executing program) 2023/01/18 16:51:55 fetching corpus: 19494, signal 719192/1002546 (executing program) 2023/01/18 16:51:55 fetching corpus: 19544, signal 719665/1003430 (executing program) 2023/01/18 16:51:55 fetching corpus: 19594, signal 720195/1004306 (executing program) 2023/01/18 16:51:55 fetching corpus: 19644, signal 720886/1005276 (executing program) 2023/01/18 16:51:56 fetching corpus: 19694, signal 722581/1006480 (executing program) 2023/01/18 16:51:56 fetching corpus: 19744, signal 723723/1007566 (executing program) 2023/01/18 16:51:56 fetching corpus: 19794, signal 724131/1008382 (executing program) 2023/01/18 16:51:56 fetching corpus: 19844, signal 724641/1009285 (executing program) 2023/01/18 16:51:56 fetching corpus: 19894, signal 725113/1010085 (executing program) 2023/01/18 16:51:57 fetching corpus: 19944, signal 725851/1010983 (executing program) 2023/01/18 16:51:57 fetching corpus: 19994, signal 726335/1011828 (executing program) 2023/01/18 16:51:57 fetching corpus: 20044, signal 727075/1012741 (executing program) 2023/01/18 16:51:57 fetching corpus: 20094, signal 727566/1013575 (executing program) 2023/01/18 16:51:57 fetching corpus: 20144, signal 728243/1014489 (executing program) 2023/01/18 16:51:58 fetching corpus: 20194, signal 728676/1015296 (executing program) 2023/01/18 16:51:58 fetching corpus: 20244, signal 729411/1016218 (executing program) 2023/01/18 16:51:58 fetching corpus: 20294, signal 729838/1017063 (executing program) 2023/01/18 16:51:58 fetching corpus: 20344, signal 730262/1017882 (executing program) 2023/01/18 16:51:58 fetching corpus: 20394, signal 730623/1018710 (executing program) 2023/01/18 16:51:59 fetching corpus: 20444, signal 731088/1019544 (executing program) 2023/01/18 16:51:59 fetching corpus: 20494, signal 732649/1020675 (executing program) 2023/01/18 16:51:59 fetching corpus: 20544, signal 733159/1021522 (executing program) 2023/01/18 16:51:59 fetching corpus: 20594, signal 733658/1022353 (executing program) 2023/01/18 16:51:59 fetching corpus: 20644, signal 734142/1023204 (executing program) 2023/01/18 16:51:59 fetching corpus: 20694, signal 734777/1024088 (executing program) 2023/01/18 16:52:00 fetching corpus: 20744, signal 735127/1024875 (executing program) 2023/01/18 16:52:00 fetching corpus: 20794, signal 735730/1025737 (executing program) 2023/01/18 16:52:00 fetching corpus: 20844, signal 736196/1026569 (executing program) 2023/01/18 16:52:00 fetching corpus: 20894, signal 736903/1027412 (executing program) 2023/01/18 16:52:00 fetching corpus: 20944, signal 737877/1028366 (executing program) 2023/01/18 16:52:01 fetching corpus: 20994, signal 738355/1029194 (executing program) 2023/01/18 16:52:01 fetching corpus: 21044, signal 738705/1029980 (executing program) 2023/01/18 16:52:01 fetching corpus: 21094, signal 739104/1030771 (executing program) 2023/01/18 16:52:01 fetching corpus: 21144, signal 739578/1031584 (executing program) 2023/01/18 16:52:01 fetching corpus: 21194, signal 740087/1032386 (executing program) 2023/01/18 16:52:01 fetching corpus: 21244, signal 740542/1033111 (executing program) 2023/01/18 16:52:02 fetching corpus: 21294, signal 741068/1033921 (executing program) 2023/01/18 16:52:02 fetching corpus: 21344, signal 741692/1034726 (executing program) 2023/01/18 16:52:02 fetching corpus: 21394, signal 742206/1035547 (executing program) 2023/01/18 16:52:02 fetching corpus: 21444, signal 742835/1036329 (executing program) 2023/01/18 16:52:02 fetching corpus: 21494, signal 743176/1037094 (executing program) 2023/01/18 16:52:03 fetching corpus: 21544, signal 743703/1037927 (executing program) 2023/01/18 16:52:03 fetching corpus: 21594, signal 744302/1038739 (executing program) 2023/01/18 16:52:03 fetching corpus: 21644, signal 744653/1039457 (executing program) 2023/01/18 16:52:03 fetching corpus: 21694, signal 745238/1040262 (executing program) 2023/01/18 16:52:03 fetching corpus: 21744, signal 745806/1041065 (executing program) 2023/01/18 16:52:04 fetching corpus: 21794, signal 746365/1041874 (executing program) 2023/01/18 16:52:04 fetching corpus: 21844, signal 746747/1042619 (executing program) 2023/01/18 16:52:04 fetching corpus: 21894, signal 747256/1043396 (executing program) 2023/01/18 16:52:04 fetching corpus: 21944, signal 747755/1044162 (executing program) 2023/01/18 16:52:04 fetching corpus: 21994, signal 748333/1044983 (executing program) 2023/01/18 16:52:05 fetching corpus: 22044, signal 748723/1045764 (executing program) 2023/01/18 16:52:05 fetching corpus: 22094, signal 749666/1046646 (executing program) 2023/01/18 16:52:05 fetching corpus: 22144, signal 750168/1047449 (executing program) 2023/01/18 16:52:05 fetching corpus: 22194, signal 750617/1048195 (executing program) 2023/01/18 16:52:05 fetching corpus: 22244, signal 751125/1048945 (executing program) 2023/01/18 16:52:05 fetching corpus: 22294, signal 751597/1049717 (executing program) 2023/01/18 16:52:06 fetching corpus: 22344, signal 752125/1050470 (executing program) 2023/01/18 16:52:06 fetching corpus: 22394, signal 752656/1051230 (executing program) 2023/01/18 16:52:06 fetching corpus: 22444, signal 753098/1051992 (executing program) 2023/01/18 16:52:06 fetching corpus: 22494, signal 754060/1052872 (executing program) 2023/01/18 16:52:07 fetching corpus: 22544, signal 754982/1053721 (executing program) 2023/01/18 16:52:07 fetching corpus: 22594, signal 755613/1054564 (executing program) 2023/01/18 16:52:07 fetching corpus: 22644, signal 756044/1055316 (executing program) 2023/01/18 16:52:07 fetching corpus: 22694, signal 756567/1056093 (executing program) 2023/01/18 16:52:07 fetching corpus: 22744, signal 757299/1056906 (executing program) 2023/01/18 16:52:08 fetching corpus: 22794, signal 757830/1057679 (executing program) 2023/01/18 16:52:08 fetching corpus: 22844, signal 758144/1058402 (executing program) 2023/01/18 16:52:08 fetching corpus: 22894, signal 758666/1059100 (executing program) 2023/01/18 16:52:08 fetching corpus: 22944, signal 759113/1059837 (executing program) 2023/01/18 16:52:09 fetching corpus: 22994, signal 759446/1060582 (executing program) 2023/01/18 16:52:09 fetching corpus: 23044, signal 760032/1061327 (executing program) 2023/01/18 16:52:09 fetching corpus: 23094, signal 760912/1062138 (executing program) 2023/01/18 16:52:09 fetching corpus: 23144, signal 761290/1062858 (executing program) 2023/01/18 16:52:09 fetching corpus: 23194, signal 761870/1063590 (executing program) 2023/01/18 16:52:10 fetching corpus: 23244, signal 762271/1064331 (executing program) 2023/01/18 16:52:10 fetching corpus: 23294, signal 762887/1065112 (executing program) 2023/01/18 16:52:10 fetching corpus: 23344, signal 763628/1065950 (executing program) 2023/01/18 16:52:10 fetching corpus: 23394, signal 764089/1066719 (executing program) 2023/01/18 16:52:10 fetching corpus: 23444, signal 764567/1067498 (executing program) 2023/01/18 16:52:10 fetching corpus: 23494, signal 765002/1068246 (executing program) 2023/01/18 16:52:11 fetching corpus: 23544, signal 765433/1068966 (executing program) 2023/01/18 16:52:11 fetching corpus: 23594, signal 765937/1069661 (executing program) 2023/01/18 16:52:11 fetching corpus: 23643, signal 766847/1070476 (executing program) 2023/01/18 16:52:11 fetching corpus: 23693, signal 767350/1071186 (executing program) 2023/01/18 16:52:11 fetching corpus: 23742, signal 767999/1071885 (executing program) 2023/01/18 16:52:12 fetching corpus: 23792, signal 768714/1072660 (executing program) 2023/01/18 16:52:12 fetching corpus: 23842, signal 769034/1073345 (executing program) 2023/01/18 16:52:12 fetching corpus: 23892, signal 769496/1074044 (executing program) 2023/01/18 16:52:12 fetching corpus: 23942, signal 770028/1074739 (executing program) 2023/01/18 16:52:12 fetching corpus: 23992, signal 770731/1075449 (executing program) 2023/01/18 16:52:13 fetching corpus: 24042, signal 771172/1076142 (executing program) 2023/01/18 16:52:13 fetching corpus: 24092, signal 771769/1076889 (executing program) 2023/01/18 16:52:13 fetching corpus: 24142, signal 772328/1077585 (executing program) 2023/01/18 16:52:13 fetching corpus: 24192, signal 772863/1078349 (executing program) 2023/01/18 16:52:13 fetching corpus: 24242, signal 773667/1079090 (executing program) 2023/01/18 16:52:13 fetching corpus: 24292, signal 774376/1079859 (executing program) 2023/01/18 16:52:14 fetching corpus: 24342, signal 774997/1080578 (executing program) 2023/01/18 16:52:14 fetching corpus: 24392, signal 775647/1081286 (executing program) 2023/01/18 16:52:14 fetching corpus: 24442, signal 776155/1081967 (executing program) 2023/01/18 16:52:14 fetching corpus: 24492, signal 776708/1082626 (executing program) 2023/01/18 16:52:14 fetching corpus: 24542, signal 777061/1083277 (executing program) 2023/01/18 16:52:15 fetching corpus: 24592, signal 777470/1083961 (executing program) 2023/01/18 16:52:15 fetching corpus: 24642, signal 778455/1084715 (executing program) 2023/01/18 16:52:15 fetching corpus: 24692, signal 779075/1085366 (executing program) 2023/01/18 16:52:15 fetching corpus: 24742, signal 779538/1086010 (executing program) 2023/01/18 16:52:15 fetching corpus: 24792, signal 780085/1086688 (executing program) 2023/01/18 16:52:16 fetching corpus: 24842, signal 780499/1087330 (executing program) 2023/01/18 16:52:16 fetching corpus: 24892, signal 781076/1088019 (executing program) 2023/01/18 16:52:16 fetching corpus: 24942, signal 781415/1088678 (executing program) 2023/01/18 16:52:16 fetching corpus: 24992, signal 781933/1089372 (executing program) 2023/01/18 16:52:17 fetching corpus: 25042, signal 782460/1090027 (executing program) 2023/01/18 16:52:17 fetching corpus: 25092, signal 783129/1090742 (executing program) 2023/01/18 16:52:17 fetching corpus: 25142, signal 783586/1091386 (executing program) 2023/01/18 16:52:17 fetching corpus: 25192, signal 783914/1092023 (executing program) 2023/01/18 16:52:17 fetching corpus: 25242, signal 784340/1092666 (executing program) 2023/01/18 16:52:18 fetching corpus: 25292, signal 784779/1093334 (executing program) 2023/01/18 16:52:18 fetching corpus: 25342, signal 785182/1093961 (executing program) 2023/01/18 16:52:18 fetching corpus: 25392, signal 785483/1094603 (executing program) 2023/01/18 16:52:18 fetching corpus: 25442, signal 785851/1095250 (executing program) 2023/01/18 16:52:18 fetching corpus: 25492, signal 786408/1095923 (executing program) 2023/01/18 16:52:18 fetching corpus: 25542, signal 786778/1096572 (executing program) 2023/01/18 16:52:19 fetching corpus: 25592, signal 787367/1097242 (executing program) 2023/01/18 16:52:19 fetching corpus: 25642, signal 787691/1097842 (executing program) 2023/01/18 16:52:19 fetching corpus: 25692, signal 788084/1098518 (executing program) 2023/01/18 16:52:19 fetching corpus: 25742, signal 788509/1099170 (executing program) 2023/01/18 16:52:19 fetching corpus: 25792, signal 788958/1099813 (executing program) 2023/01/18 16:52:20 fetching corpus: 25842, signal 789503/1100453 (executing program) 2023/01/18 16:52:20 fetching corpus: 25892, signal 790122/1101087 (executing program) 2023/01/18 16:52:20 fetching corpus: 25942, signal 790546/1101688 (executing program) 2023/01/18 16:52:20 fetching corpus: 25992, signal 790855/1102336 (executing program) 2023/01/18 16:52:21 fetching corpus: 26042, signal 791196/1102966 (executing program) 2023/01/18 16:52:21 fetching corpus: 26092, signal 791586/1103579 (executing program) 2023/01/18 16:52:21 fetching corpus: 26142, signal 792030/1104182 (executing program) 2023/01/18 16:52:21 fetching corpus: 26192, signal 792394/1104792 (executing program) 2023/01/18 16:52:21 fetching corpus: 26242, signal 792927/1105365 (executing program) 2023/01/18 16:52:21 fetching corpus: 26292, signal 793601/1105997 (executing program) 2023/01/18 16:52:21 fetching corpus: 26342, signal 793869/1106570 (executing program) 2023/01/18 16:52:22 fetching corpus: 26392, signal 794268/1107196 (executing program) 2023/01/18 16:52:22 fetching corpus: 26442, signal 794649/1107845 (executing program) 2023/01/18 16:52:22 fetching corpus: 26492, signal 795538/1108487 (executing program) 2023/01/18 16:52:22 fetching corpus: 26542, signal 796025/1109077 (executing program) 2023/01/18 16:52:22 fetching corpus: 26592, signal 796514/1109694 (executing program) 2023/01/18 16:52:23 fetching corpus: 26642, signal 796902/1110317 (executing program) 2023/01/18 16:52:23 fetching corpus: 26692, signal 797290/1110922 (executing program) 2023/01/18 16:52:23 fetching corpus: 26742, signal 797627/1111495 (executing program) 2023/01/18 16:52:23 fetching corpus: 26792, signal 798035/1112101 (executing program) 2023/01/18 16:52:23 fetching corpus: 26842, signal 798391/1112706 (executing program) 2023/01/18 16:52:23 fetching corpus: 26892, signal 798872/1113275 (executing program) 2023/01/18 16:52:24 fetching corpus: 26942, signal 799300/1113899 (executing program) 2023/01/18 16:52:24 fetching corpus: 26992, signal 799908/1114532 (executing program) 2023/01/18 16:52:24 fetching corpus: 27042, signal 800403/1115119 (executing program) 2023/01/18 16:52:24 fetching corpus: 27092, signal 800763/1115739 (executing program) 2023/01/18 16:52:25 fetching corpus: 27142, signal 801273/1116344 (executing program) 2023/01/18 16:52:25 fetching corpus: 27192, signal 801632/1116937 (executing program) 2023/01/18 16:52:25 fetching corpus: 27242, signal 802183/1117560 (executing program) 2023/01/18 16:52:25 fetching corpus: 27292, signal 802641/1118153 (executing program) 2023/01/18 16:52:25 fetching corpus: 27342, signal 803439/1118743 (executing program) 2023/01/18 16:52:26 fetching corpus: 27392, signal 803999/1119354 (executing program) 2023/01/18 16:52:26 fetching corpus: 27442, signal 804482/1119914 (executing program) 2023/01/18 16:52:26 fetching corpus: 27492, signal 804796/1120513 (executing program) 2023/01/18 16:52:26 fetching corpus: 27542, signal 805303/1121104 (executing program) 2023/01/18 16:52:26 fetching corpus: 27592, signal 805604/1121703 (executing program) 2023/01/18 16:52:26 fetching corpus: 27642, signal 805936/1122285 (executing program) 2023/01/18 16:52:27 fetching corpus: 27692, signal 806317/1122861 (executing program) 2023/01/18 16:52:27 fetching corpus: 27742, signal 806867/1123474 (executing program) 2023/01/18 16:52:27 fetching corpus: 27792, signal 807359/1124045 (executing program) 2023/01/18 16:52:27 fetching corpus: 27842, signal 807743/1124616 (executing program) 2023/01/18 16:52:27 fetching corpus: 27892, signal 807954/1125169 (executing program) 2023/01/18 16:52:28 fetching corpus: 27942, signal 808374/1125735 (executing program) 2023/01/18 16:52:28 fetching corpus: 27992, signal 808858/1126316 (executing program) 2023/01/18 16:52:28 fetching corpus: 28042, signal 809410/1126906 (executing program) 2023/01/18 16:52:28 fetching corpus: 28092, signal 809669/1127468 (executing program) 2023/01/18 16:52:29 fetching corpus: 28142, signal 810177/1128027 (executing program) [ 199.132976][ T1210] ieee802154 phy0 wpan0: encryption failed: -22 [ 199.139409][ T1210] ieee802154 phy1 wpan1: encryption failed: -22 2023/01/18 16:52:29 fetching corpus: 28192, signal 810576/1128027 (executing program) 2023/01/18 16:52:29 fetching corpus: 28242, signal 810866/1128027 (executing program) 2023/01/18 16:52:29 fetching corpus: 28292, signal 811229/1128027 (executing program) 2023/01/18 16:52:30 fetching corpus: 28342, signal 811582/1128027 (executing program) 2023/01/18 16:52:30 fetching corpus: 28392, signal 811928/1128027 (executing program) 2023/01/18 16:52:30 fetching corpus: 28442, signal 812512/1128027 (executing program) 2023/01/18 16:52:30 fetching corpus: 28492, signal 812989/1128027 (executing program) 2023/01/18 16:52:30 fetching corpus: 28542, signal 813399/1128027 (executing program) 2023/01/18 16:52:30 fetching corpus: 28592, signal 813891/1128027 (executing program) 2023/01/18 16:52:31 fetching corpus: 28642, signal 814278/1128027 (executing program) 2023/01/18 16:52:31 fetching corpus: 28692, signal 814780/1128027 (executing program) 2023/01/18 16:52:31 fetching corpus: 28742, signal 815188/1128027 (executing program) 2023/01/18 16:52:31 fetching corpus: 28792, signal 815668/1128027 (executing program) 2023/01/18 16:52:31 fetching corpus: 28842, signal 815998/1128027 (executing program) 2023/01/18 16:52:31 fetching corpus: 28892, signal 816292/1128027 (executing program) 2023/01/18 16:52:32 fetching corpus: 28942, signal 816884/1128027 (executing program) 2023/01/18 16:52:32 fetching corpus: 28992, signal 817460/1128027 (executing program) 2023/01/18 16:52:32 fetching corpus: 29042, signal 817801/1128027 (executing program) 2023/01/18 16:52:32 fetching corpus: 29092, signal 818177/1128027 (executing program) 2023/01/18 16:52:33 fetching corpus: 29142, signal 818619/1128027 (executing program) 2023/01/18 16:52:33 fetching corpus: 29192, signal 819052/1128027 (executing program) 2023/01/18 16:52:33 fetching corpus: 29242, signal 819312/1128027 (executing program) 2023/01/18 16:52:33 fetching corpus: 29292, signal 819860/1128027 (executing program) 2023/01/18 16:52:33 fetching corpus: 29342, signal 820171/1128027 (executing program) 2023/01/18 16:52:34 fetching corpus: 29392, signal 820894/1128027 (executing program) 2023/01/18 16:52:34 fetching corpus: 29441, signal 821358/1128027 (executing program) 2023/01/18 16:52:34 fetching corpus: 29491, signal 821634/1128027 (executing program) 2023/01/18 16:52:34 fetching corpus: 29541, signal 822019/1128027 (executing program) 2023/01/18 16:52:34 fetching corpus: 29591, signal 822417/1128027 (executing program) 2023/01/18 16:52:35 fetching corpus: 29641, signal 822798/1128027 (executing program) 2023/01/18 16:52:35 fetching corpus: 29691, signal 823217/1128027 (executing program) 2023/01/18 16:52:35 fetching corpus: 29741, signal 823575/1128027 (executing program) 2023/01/18 16:52:35 fetching corpus: 29791, signal 824108/1128027 (executing program) 2023/01/18 16:52:35 fetching corpus: 29841, signal 824582/1128027 (executing program) 2023/01/18 16:52:36 fetching corpus: 29891, signal 825009/1128027 (executing program) 2023/01/18 16:52:36 fetching corpus: 29941, signal 825463/1128027 (executing program) 2023/01/18 16:52:36 fetching corpus: 29991, signal 825809/1128027 (executing program) 2023/01/18 16:52:36 fetching corpus: 30041, signal 826061/1128027 (executing program) 2023/01/18 16:52:36 fetching corpus: 30091, signal 826441/1128027 (executing program) 2023/01/18 16:52:36 fetching corpus: 30141, signal 826949/1128027 (executing program) 2023/01/18 16:52:37 fetching corpus: 30191, signal 827208/1128036 (executing program) 2023/01/18 16:52:37 fetching corpus: 30241, signal 827665/1128036 (executing program) 2023/01/18 16:52:37 fetching corpus: 30291, signal 827982/1128036 (executing program) 2023/01/18 16:52:37 fetching corpus: 30341, signal 828422/1128036 (executing program) 2023/01/18 16:52:37 fetching corpus: 30391, signal 828957/1128036 (executing program) 2023/01/18 16:52:37 fetching corpus: 30441, signal 829730/1128036 (executing program) 2023/01/18 16:52:38 fetching corpus: 30491, signal 830166/1128036 (executing program) 2023/01/18 16:52:38 fetching corpus: 30541, signal 830508/1128036 (executing program) 2023/01/18 16:52:38 fetching corpus: 30591, signal 832712/1128036 (executing program) 2023/01/18 16:52:38 fetching corpus: 30641, signal 833054/1128036 (executing program) 2023/01/18 16:52:39 fetching corpus: 30691, signal 833325/1128036 (executing program) 2023/01/18 16:52:39 fetching corpus: 30741, signal 833696/1128036 (executing program) 2023/01/18 16:52:39 fetching corpus: 30791, signal 834253/1128036 (executing program) 2023/01/18 16:52:39 fetching corpus: 30841, signal 834503/1128038 (executing program) 2023/01/18 16:52:39 fetching corpus: 30891, signal 834952/1128038 (executing program) 2023/01/18 16:52:40 fetching corpus: 30941, signal 835370/1128038 (executing program) 2023/01/18 16:52:40 fetching corpus: 30991, signal 835772/1128038 (executing program) 2023/01/18 16:52:40 fetching corpus: 31041, signal 837027/1128038 (executing program) 2023/01/18 16:52:40 fetching corpus: 31091, signal 837442/1128038 (executing program) 2023/01/18 16:52:40 fetching corpus: 31141, signal 837854/1128038 (executing program) 2023/01/18 16:52:41 fetching corpus: 31191, signal 838130/1128038 (executing program) 2023/01/18 16:52:41 fetching corpus: 31241, signal 838569/1128038 (executing program) 2023/01/18 16:52:41 fetching corpus: 31291, signal 838859/1128038 (executing program) 2023/01/18 16:52:41 fetching corpus: 31341, signal 839141/1128038 (executing program) 2023/01/18 16:52:41 fetching corpus: 31391, signal 839387/1128038 (executing program) 2023/01/18 16:52:41 fetching corpus: 31441, signal 839631/1128038 (executing program) 2023/01/18 16:52:41 fetching corpus: 31491, signal 839977/1128038 (executing program) 2023/01/18 16:52:42 fetching corpus: 31541, signal 840234/1128038 (executing program) 2023/01/18 16:52:42 fetching corpus: 31591, signal 840502/1128038 (executing program) 2023/01/18 16:52:42 fetching corpus: 31641, signal 840773/1128038 (executing program) 2023/01/18 16:52:42 fetching corpus: 31691, signal 841141/1128038 (executing program) 2023/01/18 16:52:42 fetching corpus: 31741, signal 841525/1128038 (executing program) 2023/01/18 16:52:42 fetching corpus: 31791, signal 841870/1128038 (executing program) 2023/01/18 16:52:43 fetching corpus: 31841, signal 842220/1128038 (executing program) 2023/01/18 16:52:43 fetching corpus: 31891, signal 842588/1128038 (executing program) 2023/01/18 16:52:43 fetching corpus: 31941, signal 843080/1128038 (executing program) 2023/01/18 16:52:44 fetching corpus: 31991, signal 843657/1128038 (executing program) 2023/01/18 16:52:44 fetching corpus: 32041, signal 844116/1128038 (executing program) 2023/01/18 16:52:44 fetching corpus: 32091, signal 844501/1128038 (executing program) 2023/01/18 16:52:44 fetching corpus: 32141, signal 844992/1128038 (executing program) 2023/01/18 16:52:44 fetching corpus: 32191, signal 845350/1128038 (executing program) 2023/01/18 16:52:45 fetching corpus: 32241, signal 845722/1128038 (executing program) 2023/01/18 16:52:45 fetching corpus: 32291, signal 846167/1128038 (executing program) 2023/01/18 16:52:45 fetching corpus: 32341, signal 846494/1128038 (executing program) 2023/01/18 16:52:45 fetching corpus: 32391, signal 846974/1128038 (executing program) 2023/01/18 16:52:45 fetching corpus: 32441, signal 847345/1128038 (executing program) 2023/01/18 16:52:46 fetching corpus: 32491, signal 847925/1128038 (executing program) 2023/01/18 16:52:46 fetching corpus: 32541, signal 848357/1128038 (executing program) 2023/01/18 16:52:46 fetching corpus: 32591, signal 849624/1128038 (executing program) 2023/01/18 16:52:46 fetching corpus: 32641, signal 849893/1128038 (executing program) 2023/01/18 16:52:46 fetching corpus: 32691, signal 850299/1128038 (executing program) 2023/01/18 16:52:46 fetching corpus: 32741, signal 850606/1128038 (executing program) 2023/01/18 16:52:47 fetching corpus: 32791, signal 850909/1128038 (executing program) 2023/01/18 16:52:47 fetching corpus: 32841, signal 851442/1128038 (executing program) 2023/01/18 16:52:47 fetching corpus: 32891, signal 851875/1128038 (executing program) 2023/01/18 16:52:47 fetching corpus: 32941, signal 852132/1128038 (executing program) 2023/01/18 16:52:47 fetching corpus: 32991, signal 852563/1128038 (executing program) 2023/01/18 16:52:47 fetching corpus: 33041, signal 853138/1128038 (executing program) 2023/01/18 16:52:48 fetching corpus: 33091, signal 854232/1128038 (executing program) 2023/01/18 16:52:48 fetching corpus: 33141, signal 854683/1128038 (executing program) 2023/01/18 16:52:48 fetching corpus: 33191, signal 855090/1128038 (executing program) 2023/01/18 16:52:48 fetching corpus: 33241, signal 855567/1128038 (executing program) 2023/01/18 16:52:49 fetching corpus: 33291, signal 856195/1128040 (executing program) 2023/01/18 16:52:49 fetching corpus: 33341, signal 856514/1128040 (executing program) 2023/01/18 16:52:49 fetching corpus: 33391, signal 856917/1128040 (executing program) 2023/01/18 16:52:49 fetching corpus: 33441, signal 857178/1128040 (executing program) 2023/01/18 16:52:49 fetching corpus: 33491, signal 857602/1128040 (executing program) 2023/01/18 16:52:50 fetching corpus: 33541, signal 857932/1128040 (executing program) 2023/01/18 16:52:50 fetching corpus: 33591, signal 858328/1128040 (executing program) 2023/01/18 16:52:50 fetching corpus: 33641, signal 858761/1128044 (executing program) 2023/01/18 16:52:50 fetching corpus: 33691, signal 859195/1128044 (executing program) 2023/01/18 16:52:51 fetching corpus: 33741, signal 859486/1128044 (executing program) 2023/01/18 16:52:51 fetching corpus: 33791, signal 859812/1128044 (executing program) 2023/01/18 16:52:51 fetching corpus: 33841, signal 860090/1128044 (executing program) 2023/01/18 16:52:51 fetching corpus: 33891, signal 860481/1128044 (executing program) 2023/01/18 16:52:51 fetching corpus: 33941, signal 860839/1128044 (executing program) 2023/01/18 16:52:51 fetching corpus: 33991, signal 861212/1128044 (executing program) 2023/01/18 16:52:52 fetching corpus: 34041, signal 861587/1128048 (executing program) 2023/01/18 16:52:52 fetching corpus: 34091, signal 862002/1128048 (executing program) 2023/01/18 16:52:52 fetching corpus: 34141, signal 862378/1128048 (executing program) 2023/01/18 16:52:52 fetching corpus: 34191, signal 862712/1128048 (executing program) 2023/01/18 16:52:52 fetching corpus: 34241, signal 862967/1128048 (executing program) 2023/01/18 16:52:52 fetching corpus: 34291, signal 863418/1128048 (executing program) 2023/01/18 16:52:53 fetching corpus: 34341, signal 863705/1128048 (executing program) 2023/01/18 16:52:53 fetching corpus: 34391, signal 864006/1128048 (executing program) 2023/01/18 16:52:53 fetching corpus: 34441, signal 864506/1128048 (executing program) 2023/01/18 16:52:53 fetching corpus: 34491, signal 864930/1128048 (executing program) 2023/01/18 16:52:54 fetching corpus: 34541, signal 865548/1128048 (executing program) 2023/01/18 16:52:54 fetching corpus: 34591, signal 866011/1128048 (executing program) 2023/01/18 16:52:54 fetching corpus: 34641, signal 866599/1128048 (executing program) 2023/01/18 16:52:55 fetching corpus: 34691, signal 866980/1128048 (executing program) 2023/01/18 16:52:55 fetching corpus: 34741, signal 867675/1128048 (executing program) 2023/01/18 16:52:55 fetching corpus: 34791, signal 868006/1128048 (executing program) 2023/01/18 16:52:55 fetching corpus: 34841, signal 868253/1128048 (executing program) 2023/01/18 16:52:55 fetching corpus: 34891, signal 868591/1128048 (executing program) 2023/01/18 16:52:55 fetching corpus: 34941, signal 868916/1128048 (executing program) 2023/01/18 16:52:55 fetching corpus: 34991, signal 869241/1128048 (executing program) 2023/01/18 16:52:56 fetching corpus: 35041, signal 869541/1128048 (executing program) 2023/01/18 16:52:56 fetching corpus: 35091, signal 869958/1128048 (executing program) 2023/01/18 16:52:56 fetching corpus: 35141, signal 870294/1128053 (executing program) 2023/01/18 16:52:56 fetching corpus: 35191, signal 870612/1128053 (executing program) 2023/01/18 16:52:56 fetching corpus: 35241, signal 870885/1128053 (executing program) 2023/01/18 16:52:57 fetching corpus: 35291, signal 871172/1128053 (executing program) 2023/01/18 16:52:57 fetching corpus: 35341, signal 871502/1128053 (executing program) 2023/01/18 16:52:57 fetching corpus: 35391, signal 871716/1128053 (executing program) 2023/01/18 16:52:57 fetching corpus: 35441, signal 872165/1128053 (executing program) 2023/01/18 16:52:57 fetching corpus: 35491, signal 872710/1128053 (executing program) 2023/01/18 16:52:57 fetching corpus: 35541, signal 872999/1128053 (executing program) 2023/01/18 16:52:58 fetching corpus: 35590, signal 873410/1128053 (executing program) 2023/01/18 16:52:58 fetching corpus: 35640, signal 873729/1128053 (executing program) 2023/01/18 16:52:58 fetching corpus: 35690, signal 873948/1128053 (executing program) 2023/01/18 16:52:58 fetching corpus: 35740, signal 874287/1128053 (executing program) 2023/01/18 16:52:58 fetching corpus: 35790, signal 874873/1128053 (executing program) 2023/01/18 16:52:59 fetching corpus: 35840, signal 875195/1128058 (executing program) 2023/01/18 16:52:59 fetching corpus: 35890, signal 876261/1128058 (executing program) 2023/01/18 16:52:59 fetching corpus: 35940, signal 876693/1128058 (executing program) 2023/01/18 16:52:59 fetching corpus: 35990, signal 877013/1128058 (executing program) 2023/01/18 16:52:59 fetching corpus: 36040, signal 877325/1128061 (executing program) 2023/01/18 16:53:00 fetching corpus: 36089, signal 877569/1128061 (executing program) 2023/01/18 16:53:00 fetching corpus: 36139, signal 877901/1128061 (executing program) 2023/01/18 16:53:00 fetching corpus: 36189, signal 878137/1128067 (executing program) 2023/01/18 16:53:00 fetching corpus: 36239, signal 878519/1128067 (executing program) 2023/01/18 16:53:00 fetching corpus: 36289, signal 879002/1128067 (executing program) 2023/01/18 16:53:01 fetching corpus: 36339, signal 879196/1128069 (executing program) 2023/01/18 16:53:01 fetching corpus: 36389, signal 879617/1128069 (executing program) 2023/01/18 16:53:01 fetching corpus: 36439, signal 879851/1128069 (executing program) 2023/01/18 16:53:01 fetching corpus: 36489, signal 880175/1128069 (executing program) 2023/01/18 16:53:01 fetching corpus: 36539, signal 880536/1128069 (executing program) 2023/01/18 16:53:02 fetching corpus: 36589, signal 880772/1128069 (executing program) 2023/01/18 16:53:02 fetching corpus: 36639, signal 881018/1128069 (executing program) 2023/01/18 16:53:02 fetching corpus: 36689, signal 881665/1128069 (executing program) 2023/01/18 16:53:02 fetching corpus: 36739, signal 881912/1128070 (executing program) 2023/01/18 16:53:02 fetching corpus: 36789, signal 882231/1128070 (executing program) 2023/01/18 16:53:02 fetching corpus: 36839, signal 882548/1128070 (executing program) 2023/01/18 16:53:02 fetching corpus: 36889, signal 882769/1128070 (executing program) 2023/01/18 16:53:03 fetching corpus: 36939, signal 883083/1128079 (executing program) 2023/01/18 16:53:03 fetching corpus: 36989, signal 883553/1128079 (executing program) 2023/01/18 16:53:03 fetching corpus: 37039, signal 883928/1128080 (executing program) 2023/01/18 16:53:03 fetching corpus: 37089, signal 884243/1128080 (executing program) 2023/01/18 16:53:04 fetching corpus: 37139, signal 884669/1128081 (executing program) 2023/01/18 16:53:04 fetching corpus: 37189, signal 885026/1128081 (executing program) 2023/01/18 16:53:04 fetching corpus: 37239, signal 885320/1128081 (executing program) 2023/01/18 16:53:04 fetching corpus: 37289, signal 885677/1128081 (executing program) 2023/01/18 16:53:04 fetching corpus: 37339, signal 886215/1128081 (executing program) 2023/01/18 16:53:05 fetching corpus: 37389, signal 886564/1128090 (executing program) 2023/01/18 16:53:05 fetching corpus: 37439, signal 886831/1128090 (executing program) 2023/01/18 16:53:05 fetching corpus: 37489, signal 887140/1128090 (executing program) 2023/01/18 16:53:05 fetching corpus: 37539, signal 887333/1128090 (executing program) 2023/01/18 16:53:05 fetching corpus: 37589, signal 887583/1128090 (executing program) 2023/01/18 16:53:05 fetching corpus: 37639, signal 888164/1128090 (executing program) 2023/01/18 16:53:06 fetching corpus: 37689, signal 888555/1128090 (executing program) 2023/01/18 16:53:06 fetching corpus: 37739, signal 888916/1128090 (executing program) 2023/01/18 16:53:06 fetching corpus: 37789, signal 889245/1128090 (executing program) 2023/01/18 16:53:06 fetching corpus: 37839, signal 889625/1128090 (executing program) 2023/01/18 16:53:06 fetching corpus: 37889, signal 891117/1128090 (executing program) 2023/01/18 16:53:07 fetching corpus: 37939, signal 891505/1128090 (executing program) 2023/01/18 16:53:07 fetching corpus: 37989, signal 892101/1128090 (executing program) 2023/01/18 16:53:07 fetching corpus: 38039, signal 892450/1128090 (executing program) 2023/01/18 16:53:08 fetching corpus: 38089, signal 892876/1128090 (executing program) 2023/01/18 16:53:08 fetching corpus: 38139, signal 893142/1128090 (executing program) 2023/01/18 16:53:08 fetching corpus: 38189, signal 893435/1128090 (executing program) 2023/01/18 16:53:08 fetching corpus: 38239, signal 893880/1128097 (executing program) 2023/01/18 16:53:08 fetching corpus: 38288, signal 894104/1128097 (executing program) 2023/01/18 16:53:09 fetching corpus: 38338, signal 894337/1128097 (executing program) 2023/01/18 16:53:09 fetching corpus: 38388, signal 894746/1128097 (executing program) 2023/01/18 16:53:09 fetching corpus: 38438, signal 895241/1128097 (executing program) 2023/01/18 16:53:09 fetching corpus: 38488, signal 895468/1128097 (executing program) 2023/01/18 16:53:09 fetching corpus: 38538, signal 895760/1128097 (executing program) 2023/01/18 16:53:09 fetching corpus: 38588, signal 896039/1128097 (executing program) 2023/01/18 16:53:10 fetching corpus: 38638, signal 896282/1128097 (executing program) 2023/01/18 16:53:10 fetching corpus: 38688, signal 896711/1128097 (executing program) 2023/01/18 16:53:10 fetching corpus: 38738, signal 897132/1128097 (executing program) 2023/01/18 16:53:10 fetching corpus: 38788, signal 897599/1128097 (executing program) 2023/01/18 16:53:10 fetching corpus: 38838, signal 897975/1128097 (executing program) 2023/01/18 16:53:11 fetching corpus: 38888, signal 898335/1128097 (executing program) 2023/01/18 16:53:11 fetching corpus: 38938, signal 898628/1128097 (executing program) 2023/01/18 16:53:11 fetching corpus: 38988, signal 898886/1128097 (executing program) 2023/01/18 16:53:11 fetching corpus: 39038, signal 899182/1128097 (executing program) 2023/01/18 16:53:12 fetching corpus: 39088, signal 899651/1128097 (executing program) 2023/01/18 16:53:12 fetching corpus: 39138, signal 900053/1128097 (executing program) 2023/01/18 16:53:12 fetching corpus: 39188, signal 900340/1128097 (executing program) 2023/01/18 16:53:12 fetching corpus: 39238, signal 900768/1128097 (executing program) 2023/01/18 16:53:12 fetching corpus: 39288, signal 901046/1128097 (executing program) 2023/01/18 16:53:13 fetching corpus: 39338, signal 901405/1128105 (executing program) 2023/01/18 16:53:13 fetching corpus: 39388, signal 902341/1128105 (executing program) 2023/01/18 16:53:13 fetching corpus: 39438, signal 902620/1128105 (executing program) 2023/01/18 16:53:13 fetching corpus: 39488, signal 903088/1128105 (executing program) 2023/01/18 16:53:13 fetching corpus: 39538, signal 903444/1128108 (executing program) 2023/01/18 16:53:14 fetching corpus: 39588, signal 903866/1128108 (executing program) 2023/01/18 16:53:14 fetching corpus: 39638, signal 904191/1128108 (executing program) 2023/01/18 16:53:14 fetching corpus: 39688, signal 904496/1128108 (executing program) 2023/01/18 16:53:14 fetching corpus: 39738, signal 904766/1128108 (executing program) 2023/01/18 16:53:15 fetching corpus: 39788, signal 905083/1128108 (executing program) 2023/01/18 16:53:15 fetching corpus: 39838, signal 905333/1128108 (executing program) 2023/01/18 16:53:15 fetching corpus: 39888, signal 905842/1128108 (executing program) 2023/01/18 16:53:15 fetching corpus: 39938, signal 906138/1128108 (executing program) 2023/01/18 16:53:15 fetching corpus: 39988, signal 906514/1128108 (executing program) 2023/01/18 16:53:15 fetching corpus: 40038, signal 906844/1128108 (executing program) 2023/01/18 16:53:16 fetching corpus: 40088, signal 907084/1128109 (executing program) 2023/01/18 16:53:16 fetching corpus: 40138, signal 907301/1128109 (executing program) 2023/01/18 16:53:16 fetching corpus: 40188, signal 909160/1128109 (executing program) 2023/01/18 16:53:16 fetching corpus: 40238, signal 909506/1128109 (executing program) 2023/01/18 16:53:16 fetching corpus: 40288, signal 909896/1128109 (executing program) 2023/01/18 16:53:17 fetching corpus: 40337, signal 910225/1128109 (executing program) 2023/01/18 16:53:17 fetching corpus: 40387, signal 911849/1128109 (executing program) 2023/01/18 16:53:17 fetching corpus: 40437, signal 912205/1128109 (executing program) 2023/01/18 16:53:17 fetching corpus: 40487, signal 912554/1128109 (executing program) 2023/01/18 16:53:17 fetching corpus: 40537, signal 912783/1128109 (executing program) 2023/01/18 16:53:18 fetching corpus: 40587, signal 913173/1128109 (executing program) 2023/01/18 16:53:18 fetching corpus: 40637, signal 913342/1128109 (executing program) 2023/01/18 16:53:18 fetching corpus: 40687, signal 913871/1128109 (executing program) 2023/01/18 16:53:18 fetching corpus: 40737, signal 914107/1128109 (executing program) 2023/01/18 16:53:18 fetching corpus: 40787, signal 914365/1128109 (executing program) 2023/01/18 16:53:18 fetching corpus: 40837, signal 914699/1128109 (executing program) 2023/01/18 16:53:18 fetching corpus: 40887, signal 914933/1128109 (executing program) 2023/01/18 16:53:19 fetching corpus: 40937, signal 915186/1128109 (executing program) 2023/01/18 16:53:19 fetching corpus: 40987, signal 915649/1128109 (executing program) 2023/01/18 16:53:19 fetching corpus: 41037, signal 916019/1128109 (executing program) 2023/01/18 16:53:19 fetching corpus: 41087, signal 916224/1128109 (executing program) 2023/01/18 16:53:19 fetching corpus: 41137, signal 916401/1128109 (executing program) 2023/01/18 16:53:19 fetching corpus: 41187, signal 916801/1128109 (executing program) 2023/01/18 16:53:20 fetching corpus: 41237, signal 917160/1128109 (executing program) 2023/01/18 16:53:20 fetching corpus: 41287, signal 917534/1128109 (executing program) 2023/01/18 16:53:20 fetching corpus: 41337, signal 917740/1128109 (executing program) 2023/01/18 16:53:21 fetching corpus: 41387, signal 918146/1128109 (executing program) 2023/01/18 16:53:21 fetching corpus: 41437, signal 918405/1128109 (executing program) 2023/01/18 16:53:21 fetching corpus: 41487, signal 918627/1128109 (executing program) 2023/01/18 16:53:21 fetching corpus: 41537, signal 918991/1128109 (executing program) 2023/01/18 16:53:21 fetching corpus: 41587, signal 919373/1128109 (executing program) 2023/01/18 16:53:22 fetching corpus: 41637, signal 919671/1128109 (executing program) 2023/01/18 16:53:22 fetching corpus: 41687, signal 919941/1128109 (executing program) 2023/01/18 16:53:22 fetching corpus: 41737, signal 920395/1128109 (executing program) 2023/01/18 16:53:22 fetching corpus: 41787, signal 920617/1128109 (executing program) 2023/01/18 16:53:22 fetching corpus: 41837, signal 920871/1128109 (executing program) 2023/01/18 16:53:23 fetching corpus: 41887, signal 921095/1128109 (executing program) 2023/01/18 16:53:23 fetching corpus: 41937, signal 921369/1128109 (executing program) 2023/01/18 16:53:23 fetching corpus: 41987, signal 921783/1128109 (executing program) 2023/01/18 16:53:23 fetching corpus: 42037, signal 922170/1128109 (executing program) 2023/01/18 16:53:23 fetching corpus: 42087, signal 922497/1128109 (executing program) 2023/01/18 16:53:24 fetching corpus: 42137, signal 922783/1128109 (executing program) 2023/01/18 16:53:24 fetching corpus: 42187, signal 922997/1128109 (executing program) 2023/01/18 16:53:24 fetching corpus: 42237, signal 923280/1128109 (executing program) 2023/01/18 16:53:24 fetching corpus: 42287, signal 923537/1128109 (executing program) 2023/01/18 16:53:24 fetching corpus: 42337, signal 923889/1128109 (executing program) 2023/01/18 16:53:25 fetching corpus: 42387, signal 924107/1128114 (executing program) 2023/01/18 16:53:25 fetching corpus: 42437, signal 924384/1128114 (executing program) 2023/01/18 16:53:25 fetching corpus: 42487, signal 924605/1128114 (executing program) 2023/01/18 16:53:25 fetching corpus: 42537, signal 924886/1128114 (executing program) 2023/01/18 16:53:25 fetching corpus: 42587, signal 925142/1128114 (executing program) 2023/01/18 16:53:25 fetching corpus: 42637, signal 925509/1128114 (executing program) 2023/01/18 16:53:26 fetching corpus: 42687, signal 925942/1128114 (executing program) 2023/01/18 16:53:26 fetching corpus: 42737, signal 926253/1128114 (executing program) 2023/01/18 16:53:26 fetching corpus: 42787, signal 926545/1128114 (executing program) 2023/01/18 16:53:26 fetching corpus: 42837, signal 926864/1128115 (executing program) 2023/01/18 16:53:26 fetching corpus: 42887, signal 927169/1128115 (executing program) 2023/01/18 16:53:26 fetching corpus: 42937, signal 927486/1128115 (executing program) 2023/01/18 16:53:27 fetching corpus: 42987, signal 927839/1128116 (executing program) 2023/01/18 16:53:27 fetching corpus: 43037, signal 928187/1128116 (executing program) 2023/01/18 16:53:27 fetching corpus: 43087, signal 928595/1128116 (executing program) 2023/01/18 16:53:28 fetching corpus: 43137, signal 928805/1128117 (executing program) 2023/01/18 16:53:28 fetching corpus: 43187, signal 929102/1128117 (executing program) 2023/01/18 16:53:28 fetching corpus: 43237, signal 930035/1128117 (executing program) 2023/01/18 16:53:28 fetching corpus: 43287, signal 930291/1128117 (executing program) 2023/01/18 16:53:28 fetching corpus: 43337, signal 930933/1128117 (executing program) 2023/01/18 16:53:29 fetching corpus: 43387, signal 931311/1128117 (executing program) 2023/01/18 16:53:29 fetching corpus: 43437, signal 931522/1128117 (executing program) 2023/01/18 16:53:29 fetching corpus: 43487, signal 931837/1128117 (executing program) 2023/01/18 16:53:29 fetching corpus: 43537, signal 932231/1128117 (executing program) 2023/01/18 16:53:29 fetching corpus: 43587, signal 932519/1128117 (executing program) 2023/01/18 16:53:29 fetching corpus: 43637, signal 933065/1128117 (executing program) 2023/01/18 16:53:30 fetching corpus: 43687, signal 933473/1128117 (executing program) 2023/01/18 16:53:30 fetching corpus: 43737, signal 933770/1128117 (executing program) [ 260.573496][ T1210] ieee802154 phy0 wpan0: encryption failed: -22 [ 260.579891][ T1210] ieee802154 phy1 wpan1: encryption failed: -22 2023/01/18 16:53:30 fetching corpus: 43787, signal 933977/1128117 (executing program) 2023/01/18 16:53:30 fetching corpus: 43837, signal 934236/1128117 (executing program) 2023/01/18 16:53:30 fetching corpus: 43887, signal 934534/1128117 (executing program) 2023/01/18 16:53:31 fetching corpus: 43937, signal 935037/1128117 (executing program) 2023/01/18 16:53:31 fetching corpus: 43987, signal 935391/1128117 (executing program) 2023/01/18 16:53:31 fetching corpus: 44037, signal 935793/1128117 (executing program) 2023/01/18 16:53:31 fetching corpus: 44087, signal 936112/1128117 (executing program) 2023/01/18 16:53:31 fetching corpus: 44137, signal 936347/1128117 (executing program) 2023/01/18 16:53:31 fetching corpus: 44187, signal 936661/1128117 (executing program) 2023/01/18 16:53:32 fetching corpus: 44237, signal 936966/1128117 (executing program) 2023/01/18 16:53:32 fetching corpus: 44287, signal 937226/1128117 (executing program) 2023/01/18 16:53:32 fetching corpus: 44337, signal 937497/1128117 (executing program) 2023/01/18 16:53:32 fetching corpus: 44387, signal 937910/1128117 (executing program) 2023/01/18 16:53:32 fetching corpus: 44437, signal 938221/1128117 (executing program) 2023/01/18 16:53:33 fetching corpus: 44487, signal 938501/1128117 (executing program) 2023/01/18 16:53:33 fetching corpus: 44537, signal 938725/1128117 (executing program) 2023/01/18 16:53:33 fetching corpus: 44587, signal 939013/1128117 (executing program) 2023/01/18 16:53:33 fetching corpus: 44637, signal 939288/1128117 (executing program) 2023/01/18 16:53:33 fetching corpus: 44687, signal 939471/1128117 (executing program) 2023/01/18 16:53:33 fetching corpus: 44737, signal 939695/1128117 (executing program) 2023/01/18 16:53:34 fetching corpus: 44787, signal 940070/1128117 (executing program) 2023/01/18 16:53:34 fetching corpus: 44836, signal 940486/1128117 (executing program) 2023/01/18 16:53:34 fetching corpus: 44886, signal 941161/1128117 (executing program) 2023/01/18 16:53:34 fetching corpus: 44936, signal 941547/1128117 (executing program) 2023/01/18 16:53:35 fetching corpus: 44986, signal 941950/1128117 (executing program) 2023/01/18 16:53:35 fetching corpus: 45036, signal 942193/1128117 (executing program) 2023/01/18 16:53:35 fetching corpus: 45085, signal 942519/1128117 (executing program) 2023/01/18 16:53:35 fetching corpus: 45135, signal 942795/1128117 (executing program) 2023/01/18 16:53:35 fetching corpus: 45185, signal 943248/1128117 (executing program) 2023/01/18 16:53:35 fetching corpus: 45235, signal 943479/1128117 (executing program) 2023/01/18 16:53:36 fetching corpus: 45285, signal 943747/1128117 (executing program) 2023/01/18 16:53:36 fetching corpus: 45335, signal 943948/1128117 (executing program) 2023/01/18 16:53:36 fetching corpus: 45385, signal 944166/1128117 (executing program) 2023/01/18 16:53:36 fetching corpus: 45434, signal 944351/1128117 (executing program) 2023/01/18 16:53:36 fetching corpus: 45484, signal 944623/1128117 (executing program) 2023/01/18 16:53:37 fetching corpus: 45534, signal 945057/1128117 (executing program) 2023/01/18 16:53:37 fetching corpus: 45584, signal 945302/1128122 (executing program) 2023/01/18 16:53:37 fetching corpus: 45634, signal 945628/1128122 (executing program) 2023/01/18 16:53:37 fetching corpus: 45684, signal 945998/1128122 (executing program) 2023/01/18 16:53:37 fetching corpus: 45734, signal 946210/1128122 (executing program) 2023/01/18 16:53:37 fetching corpus: 45784, signal 946414/1128122 (executing program) 2023/01/18 16:53:37 fetching corpus: 45834, signal 947567/1128122 (executing program) 2023/01/18 16:53:38 fetching corpus: 45884, signal 947751/1128122 (executing program) 2023/01/18 16:53:38 fetching corpus: 45934, signal 948283/1128122 (executing program) 2023/01/18 16:53:38 fetching corpus: 45984, signal 948566/1128123 (executing program) 2023/01/18 16:53:38 fetching corpus: 46034, signal 948766/1128123 (executing program) 2023/01/18 16:53:38 fetching corpus: 46084, signal 949188/1128123 (executing program) 2023/01/18 16:53:38 fetching corpus: 46134, signal 949696/1128123 (executing program) 2023/01/18 16:53:39 fetching corpus: 46184, signal 949892/1128123 (executing program) 2023/01/18 16:53:39 fetching corpus: 46234, signal 950155/1128123 (executing program) 2023/01/18 16:53:39 fetching corpus: 46284, signal 950429/1128123 (executing program) 2023/01/18 16:53:39 fetching corpus: 46334, signal 950734/1128123 (executing program) 2023/01/18 16:53:40 fetching corpus: 46384, signal 951027/1128123 (executing program) 2023/01/18 16:53:40 fetching corpus: 46434, signal 951274/1128125 (executing program) 2023/01/18 16:53:40 fetching corpus: 46484, signal 951755/1128125 (executing program) 2023/01/18 16:53:41 fetching corpus: 46534, signal 951956/1128125 (executing program) 2023/01/18 16:53:41 fetching corpus: 46584, signal 952309/1128125 (executing program) 2023/01/18 16:53:41 fetching corpus: 46634, signal 952620/1128125 (executing program) 2023/01/18 16:53:41 fetching corpus: 46684, signal 953095/1128125 (executing program) 2023/01/18 16:53:42 fetching corpus: 46734, signal 953534/1128125 (executing program) 2023/01/18 16:53:42 fetching corpus: 46784, signal 953891/1128125 (executing program) 2023/01/18 16:53:42 fetching corpus: 46834, signal 954228/1128125 (executing program) 2023/01/18 16:53:42 fetching corpus: 46884, signal 954394/1128125 (executing program) 2023/01/18 16:53:42 fetching corpus: 46934, signal 954606/1128125 (executing program) 2023/01/18 16:53:43 fetching corpus: 46984, signal 954865/1128125 (executing program) 2023/01/18 16:53:43 fetching corpus: 47034, signal 955223/1128125 (executing program) 2023/01/18 16:53:43 fetching corpus: 47084, signal 955487/1128125 (executing program) 2023/01/18 16:53:43 fetching corpus: 47134, signal 955738/1128125 (executing program) 2023/01/18 16:53:44 fetching corpus: 47184, signal 956059/1128125 (executing program) 2023/01/18 16:53:44 fetching corpus: 47234, signal 956302/1128125 (executing program) 2023/01/18 16:53:44 fetching corpus: 47284, signal 956564/1128125 (executing program) 2023/01/18 16:53:44 fetching corpus: 47334, signal 957022/1128125 (executing program) 2023/01/18 16:53:44 fetching corpus: 47384, signal 957296/1128125 (executing program) 2023/01/18 16:53:44 fetching corpus: 47434, signal 957713/1128125 (executing program) 2023/01/18 16:53:45 fetching corpus: 47484, signal 957921/1128125 (executing program) 2023/01/18 16:53:45 fetching corpus: 47534, signal 958305/1128125 (executing program) 2023/01/18 16:53:45 fetching corpus: 47584, signal 958617/1128125 (executing program) 2023/01/18 16:53:45 fetching corpus: 47634, signal 958923/1128125 (executing program) 2023/01/18 16:53:45 fetching corpus: 47684, signal 959178/1128125 (executing program) 2023/01/18 16:53:45 fetching corpus: 47734, signal 959445/1128125 (executing program) 2023/01/18 16:53:46 fetching corpus: 47784, signal 959900/1128125 (executing program) 2023/01/18 16:53:46 fetching corpus: 47834, signal 960148/1128125 (executing program) 2023/01/18 16:53:46 fetching corpus: 47884, signal 960454/1128125 (executing program) 2023/01/18 16:53:46 fetching corpus: 47934, signal 960844/1128125 (executing program) 2023/01/18 16:53:46 fetching corpus: 47984, signal 961075/1128125 (executing program) 2023/01/18 16:53:47 fetching corpus: 48034, signal 961278/1128125 (executing program) 2023/01/18 16:53:47 fetching corpus: 48084, signal 961593/1128125 (executing program) 2023/01/18 16:53:47 fetching corpus: 48134, signal 961796/1128125 (executing program) 2023/01/18 16:53:47 fetching corpus: 48184, signal 962030/1128125 (executing program) 2023/01/18 16:53:47 fetching corpus: 48234, signal 962349/1128125 (executing program) 2023/01/18 16:53:47 fetching corpus: 48284, signal 962699/1128125 (executing program) 2023/01/18 16:53:48 fetching corpus: 48334, signal 963014/1128125 (executing program) 2023/01/18 16:53:48 fetching corpus: 48384, signal 963184/1128125 (executing program) 2023/01/18 16:53:48 fetching corpus: 48434, signal 963987/1128125 (executing program) 2023/01/18 16:53:48 fetching corpus: 48484, signal 964231/1128125 (executing program) 2023/01/18 16:53:48 fetching corpus: 48534, signal 964588/1128125 (executing program) 2023/01/18 16:53:49 fetching corpus: 48584, signal 964786/1128125 (executing program) 2023/01/18 16:53:49 fetching corpus: 48634, signal 965108/1128125 (executing program) 2023/01/18 16:53:49 fetching corpus: 48684, signal 965310/1128125 (executing program) 2023/01/18 16:53:49 fetching corpus: 48734, signal 965588/1128125 (executing program) 2023/01/18 16:53:50 fetching corpus: 48784, signal 966214/1128125 (executing program) 2023/01/18 16:53:50 fetching corpus: 48834, signal 966512/1128125 (executing program) 2023/01/18 16:53:50 fetching corpus: 48884, signal 966993/1128125 (executing program) 2023/01/18 16:53:50 fetching corpus: 48934, signal 967215/1128125 (executing program) 2023/01/18 16:53:50 fetching corpus: 48984, signal 967457/1128125 (executing program) 2023/01/18 16:53:50 fetching corpus: 49034, signal 967637/1128125 (executing program) 2023/01/18 16:53:51 fetching corpus: 49084, signal 967985/1128125 (executing program) 2023/01/18 16:53:51 fetching corpus: 49134, signal 968287/1128125 (executing program) 2023/01/18 16:53:51 fetching corpus: 49184, signal 968668/1128125 (executing program) 2023/01/18 16:53:51 fetching corpus: 49234, signal 968913/1128125 (executing program) 2023/01/18 16:53:52 fetching corpus: 49284, signal 969160/1128125 (executing program) 2023/01/18 16:53:52 fetching corpus: 49334, signal 969372/1128125 (executing program) 2023/01/18 16:53:52 fetching corpus: 49384, signal 970978/1128125 (executing program) 2023/01/18 16:53:52 fetching corpus: 49434, signal 971238/1128125 (executing program) 2023/01/18 16:53:52 fetching corpus: 49484, signal 971742/1128125 (executing program) 2023/01/18 16:53:53 fetching corpus: 49534, signal 972054/1128125 (executing program) 2023/01/18 16:53:53 fetching corpus: 49584, signal 972395/1128125 (executing program) 2023/01/18 16:53:53 fetching corpus: 49634, signal 972661/1128125 (executing program) 2023/01/18 16:53:53 fetching corpus: 49684, signal 972934/1128125 (executing program) 2023/01/18 16:53:53 fetching corpus: 49734, signal 973253/1128125 (executing program) 2023/01/18 16:53:54 fetching corpus: 49784, signal 973507/1128125 (executing program) 2023/01/18 16:53:54 fetching corpus: 49834, signal 973827/1128125 (executing program) 2023/01/18 16:53:54 fetching corpus: 49884, signal 974330/1128134 (executing program) 2023/01/18 16:53:54 fetching corpus: 49934, signal 974533/1128134 (executing program) 2023/01/18 16:53:54 fetching corpus: 49984, signal 974937/1128134 (executing program) 2023/01/18 16:53:54 fetching corpus: 50034, signal 975148/1128134 (executing program) 2023/01/18 16:53:55 fetching corpus: 50084, signal 975481/1128134 (executing program) 2023/01/18 16:53:55 fetching corpus: 50134, signal 975658/1128134 (executing program) 2023/01/18 16:53:55 fetching corpus: 50184, signal 975966/1128134 (executing program) 2023/01/18 16:53:55 fetching corpus: 50234, signal 976429/1128134 (executing program) 2023/01/18 16:53:55 fetching corpus: 50284, signal 976637/1128134 (executing program) 2023/01/18 16:54:04 fetching corpus: 50334, signal 976907/1128134 (executing program) 2023/01/18 16:54:04 fetching corpus: 50377, signal 977131/1128134 (executing program) 2023/01/18 16:54:04 fetching corpus: 50377, signal 977131/1128134 (executing program) 2023/01/18 16:54:07 starting 6 fuzzer processes 16:54:07 executing program 0: open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x6, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x4, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x765a1e5d, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) fcntl$getown(r3, 0x9) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x4000, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r5 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482cbae9a17ba12fc50ab1b6e3e", 0x15}], 0x1, 0x81806, 0x2) sendfile(r4, r5, 0x0, 0x100000000000042) 16:54:07 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f00000000c0)={'b', ' *:* ', 'rwm\x00'}, 0xa) 16:54:07 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000004400), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x80503d0a, &(0x7f0000000400)) 16:54:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r2, 0xffffffffffffffff) r3 = dup(r0) ioctl$TIOCSTI(r3, 0x5412, 0x0) 16:54:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="adcd1a9a3fc36e961ed00fe41b0cd695", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000140)="c1b6ee536f3370675601c8f98b00006581d9df7de98bbdea27093e27435ac5", 0x1f) r2 = io_uring_setup(0x429c, &(0x7f0000000000)) recvmmsg(r1, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f00000008c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 16:54:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') r4 = dup3(r2, r3, 0x0) ioctl$KVM_SET_CPUID2(r4, 0x8090ae81, &(0x7f0000000240)) [ 297.431791][ T26] audit: type=1400 audit(1674060847.290:84): avc: denied { execmem } for pid=5082 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 297.812949][ T26] audit: type=1400 audit(1674060847.670:85): avc: denied { mounton } for pid=5092 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 297.871465][ T26] audit: type=1400 audit(1674060847.700:86): avc: denied { mount } for pid=5092 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 297.926160][ T5096] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 297.934759][ T5096] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 297.944064][ T5096] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 297.951831][ T5096] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 297.960980][ T5096] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 297.964654][ T5098] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 297.972963][ T26] audit: type=1400 audit(1674060847.700:87): avc: denied { create } for pid=5092 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 297.977685][ T5098] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 297.996087][ T26] audit: type=1400 audit(1674060847.700:88): avc: denied { read write } for pid=5092 comm="syz-executor.0" name="vhci" dev="devtmpfs" ino=1076 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 298.004509][ T5098] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 298.026844][ T26] audit: type=1400 audit(1674060847.700:89): avc: denied { open } for pid=5092 comm="syz-executor.0" path="/dev/vhci" dev="devtmpfs" ino=1076 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 298.057856][ T5096] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 298.057870][ T5099] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 298.065599][ T26] audit: type=1400 audit(1674060847.740:90): avc: denied { ioctl } for pid=5092 comm="syz-executor.0" path="socket:[29893]" dev="sockfs" ino=29893 ioctlcmd=0x48c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 298.100021][ T4375] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 298.108591][ T5096] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 298.112077][ T4375] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 298.151473][ T4375] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 298.161050][ T4375] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 298.175630][ T4375] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 298.183488][ T26] audit: type=1400 audit(1674060847.970:91): avc: denied { read } for pid=5092 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 298.205258][ T5096] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 298.205494][ T4375] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 298.222012][ T4375] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 298.229833][ T4375] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 298.238760][ T5099] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 298.246344][ T5099] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 298.254821][ T26] audit: type=1400 audit(1674060847.970:92): avc: denied { open } for pid=5092 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 298.262772][ T5098] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 298.286841][ T5099] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 298.290983][ T5098] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 298.294687][ T5099] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 298.302046][ T5098] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 298.308707][ T5099] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 298.315539][ T26] audit: type=1400 audit(1674060847.970:93): avc: denied { mounton } for pid=5092 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 298.344376][ T5099] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 298.368584][ T5099] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 298.378713][ T5099] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 298.386823][ T5099] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 298.396320][ T5099] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 298.404051][ T5099] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 298.411628][ T5099] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 298.924312][ T5101] chnl_net:caif_netlink_parms(): no params data found [ 299.078461][ T5100] chnl_net:caif_netlink_parms(): no params data found [ 299.108469][ T5094] chnl_net:caif_netlink_parms(): no params data found [ 299.131096][ T5108] chnl_net:caif_netlink_parms(): no params data found [ 299.171172][ T5092] chnl_net:caif_netlink_parms(): no params data found [ 299.218755][ T5102] chnl_net:caif_netlink_parms(): no params data found [ 299.318418][ T5101] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.326265][ T5101] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.335746][ T5101] device bridge_slave_0 entered promiscuous mode [ 299.350241][ T5101] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.361527][ T5101] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.369697][ T5101] device bridge_slave_1 entered promiscuous mode [ 299.492150][ T5094] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.499303][ T5094] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.507798][ T5094] device bridge_slave_0 entered promiscuous mode [ 299.532694][ T5101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.566719][ T5094] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.573956][ T5094] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.586172][ T5094] device bridge_slave_1 entered promiscuous mode [ 299.604521][ T5101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.632748][ T5100] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.639880][ T5100] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.648352][ T5100] device bridge_slave_0 entered promiscuous mode [ 299.658189][ T5100] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.665986][ T5100] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.674979][ T5100] device bridge_slave_1 entered promiscuous mode [ 299.692888][ T5092] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.700027][ T5092] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.708753][ T5092] device bridge_slave_0 entered promiscuous mode [ 299.727892][ T5108] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.735114][ T5108] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.744064][ T5108] device bridge_slave_0 entered promiscuous mode [ 299.789257][ T5092] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.796646][ T5092] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.805610][ T5092] device bridge_slave_1 entered promiscuous mode [ 299.821006][ T5108] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.828460][ T5108] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.837455][ T5108] device bridge_slave_1 entered promiscuous mode [ 299.844684][ T5102] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.852377][ T5102] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.860526][ T5102] device bridge_slave_0 entered promiscuous mode [ 299.882383][ T5094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.905021][ T5094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 299.923023][ T5101] team0: Port device team_slave_0 added [ 299.940284][ T5102] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.947882][ T5102] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.956098][ T5102] device bridge_slave_1 entered promiscuous mode [ 299.966277][ T5100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 299.997845][ T5101] team0: Port device team_slave_1 added [ 300.030903][ T5100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.042934][ T5092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.073180][ T5108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.114019][ T5092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.126633][ T5094] team0: Port device team_slave_0 added [ 300.145546][ T5108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.156948][ T5102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.172268][ T5099] Bluetooth: hci0: command 0x0409 tx timeout [ 300.178723][ T5099] Bluetooth: hci1: command 0x0409 tx timeout [ 300.202814][ T5094] team0: Port device team_slave_1 added [ 300.209329][ T5101] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.217161][ T5101] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.243498][ T5101] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 300.275943][ T5102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.287868][ T5100] team0: Port device team_slave_0 added [ 300.319026][ T5101] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 300.326092][ T5101] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.352141][ T5099] Bluetooth: hci2: command 0x0409 tx timeout [ 300.352681][ T5101] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 300.396025][ T5100] team0: Port device team_slave_1 added [ 300.405030][ T5092] team0: Port device team_slave_0 added [ 300.411457][ T5099] Bluetooth: hci4: command 0x0409 tx timeout [ 300.417824][ T5099] Bluetooth: hci3: command 0x0409 tx timeout [ 300.439631][ T5108] team0: Port device team_slave_0 added [ 300.468117][ T5092] team0: Port device team_slave_1 added [ 300.491731][ T5099] Bluetooth: hci5: command 0x0409 tx timeout [ 300.504453][ T5094] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.511571][ T5094] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.537953][ T5094] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 300.551706][ T5108] team0: Port device team_slave_1 added [ 300.561007][ T5102] team0: Port device team_slave_0 added [ 300.589386][ T5092] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.596490][ T5092] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.622808][ T5092] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 300.635513][ T5094] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 300.642758][ T5094] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.669011][ T5094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 300.691059][ T5102] team0: Port device team_slave_1 added [ 300.697714][ T5100] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.704779][ T5100] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.730758][ T5100] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 300.753363][ T5092] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 300.760444][ T5092] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.786423][ T5092] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 300.825912][ T5100] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 300.833008][ T5100] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.859417][ T5100] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 300.883280][ T5101] device hsr_slave_0 entered promiscuous mode [ 300.890477][ T5101] device hsr_slave_1 entered promiscuous mode [ 300.932201][ T5108] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 300.939299][ T5108] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 300.966179][ T5108] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 301.031971][ T5108] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 301.038976][ T5108] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 301.065601][ T5108] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 301.077711][ T5102] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 301.085592][ T5102] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 301.111927][ T5102] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 301.156368][ T5092] device hsr_slave_0 entered promiscuous mode [ 301.165908][ T5092] device hsr_slave_1 entered promiscuous mode [ 301.179755][ T5092] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 301.188086][ T5092] Cannot create hsr debugfs directory [ 301.197374][ T5094] device hsr_slave_0 entered promiscuous mode [ 301.205020][ T5094] device hsr_slave_1 entered promiscuous mode [ 301.212376][ T5094] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 301.219971][ T5094] Cannot create hsr debugfs directory [ 301.230393][ T5102] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 301.237768][ T5102] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 301.265490][ T5102] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 301.288333][ T5100] device hsr_slave_0 entered promiscuous mode [ 301.296189][ T5100] device hsr_slave_1 entered promiscuous mode [ 301.303811][ T5100] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 301.311843][ T5100] Cannot create hsr debugfs directory [ 301.439650][ T5108] device hsr_slave_0 entered promiscuous mode [ 301.446957][ T5108] device hsr_slave_1 entered promiscuous mode [ 301.470020][ T5108] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 301.481876][ T5108] Cannot create hsr debugfs directory [ 301.500260][ T5102] device hsr_slave_0 entered promiscuous mode [ 301.508175][ T5102] device hsr_slave_1 entered promiscuous mode [ 301.518177][ T5102] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 301.526163][ T5102] Cannot create hsr debugfs directory [ 302.019027][ T5102] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 302.036702][ T5102] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 302.064276][ T5102] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 302.075721][ T5102] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 302.138149][ T5101] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 302.156989][ T5101] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 302.172669][ T5101] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 302.192815][ T5101] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 302.251611][ T5099] Bluetooth: hci1: command 0x041b tx timeout [ 302.252510][ T47] Bluetooth: hci0: command 0x041b tx timeout [ 302.321625][ T5094] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 302.333150][ T5094] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 302.347752][ T5094] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 302.357445][ T5094] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 302.412312][ T47] Bluetooth: hci2: command 0x041b tx timeout [ 302.485520][ T5102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.491472][ T47] Bluetooth: hci3: command 0x041b tx timeout [ 302.493613][ T5099] Bluetooth: hci4: command 0x041b tx timeout [ 302.524482][ T5100] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 302.540113][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.549977][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.561709][ T5102] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.572197][ T5099] Bluetooth: hci5: command 0x041b tx timeout [ 302.583337][ T5100] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 302.601107][ T5100] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 302.612521][ T5100] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 302.668322][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.677475][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.686958][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.694533][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.703832][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.713937][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.722940][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.730046][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.744762][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.816228][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.827130][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.862383][ T5101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.892590][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.913556][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.950490][ T5108] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 302.964828][ T5108] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 302.977921][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 302.990620][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 303.001608][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.010476][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 303.025171][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.034106][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.042727][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.056038][ T5101] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.079199][ T5102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 303.126513][ T5108] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 303.166067][ T5108] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 303.241731][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.250872][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.260070][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 303.260090][ T26] audit: type=1400 audit(1674060853.120:95): avc: denied { sys_module } for pid=5102 comm="syz-executor.1" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 303.260894][ T5153] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.294613][ T5153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.303146][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.313510][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.323038][ T5153] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.330189][ T5153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.352367][ T5094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.372725][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.382225][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.455675][ T5100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.480566][ T5092] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 303.491165][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.546728][ T5092] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 303.569163][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.580467][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 303.600769][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.611862][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.632594][ T5100] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.644677][ T5094] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.655581][ T5092] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 303.670629][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 303.679878][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.688192][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.703113][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.712525][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.721041][ T5151] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.728253][ T5151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.737709][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 303.746267][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.755565][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.771634][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.780466][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.796001][ T5152] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.803214][ T5152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.811445][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.820145][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.829432][ T5152] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.836591][ T5152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.845122][ T5092] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 303.898252][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.910741][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.920562][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.929269][ T5152] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.936490][ T5152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.944805][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 303.952596][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 303.960060][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.972417][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.981381][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 303.997264][ T5101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 304.010631][ T5101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.053630][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.066660][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.075664][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.084460][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 304.094160][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.103697][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 304.113278][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.122409][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.130841][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.140879][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.155575][ T5102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.196662][ T5094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.223954][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.234906][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.257416][ T5108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.312839][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.322988][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.331838][ T5099] Bluetooth: hci0: command 0x040f tx timeout [ 304.337911][ T5099] Bluetooth: hci1: command 0x040f tx timeout [ 304.342076][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.363378][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.372458][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.381045][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.390947][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.433892][ T5100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.482180][ T5056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.490326][ T5056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.498129][ T4375] Bluetooth: hci2: command 0x040f tx timeout [ 304.515009][ T5108] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.543023][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.561876][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.570786][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.579515][ T4375] Bluetooth: hci3: command 0x040f tx timeout [ 304.582031][ T5099] Bluetooth: hci4: command 0x040f tx timeout [ 304.587229][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.600804][ T5151] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.608015][ T5151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.616695][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.625519][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.633878][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.651542][ T4375] Bluetooth: hci5: command 0x040f tx timeout [ 304.662085][ T5102] device veth0_vlan entered promiscuous mode [ 304.682999][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.710290][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.742799][ T5147] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.749975][ T5147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.765773][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 304.776163][ T5147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 304.828952][ T5092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.857776][ T5102] device veth1_vlan entered promiscuous mode [ 304.892889][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 304.906448][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.943167][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 304.962389][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.972964][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.993253][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 305.012046][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.020709][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.042580][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.069824][ T5108] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 305.100516][ T5108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.126439][ T5092] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.139523][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 305.158480][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.167929][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.177391][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.186992][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 305.194938][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 305.202717][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 305.212008][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.220992][ T896] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.228188][ T896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.243983][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.257572][ T5101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.287933][ T5102] device veth0_macvtap entered promiscuous mode [ 305.302968][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 305.328032][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.340662][ T5151] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.347898][ T5151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.365993][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 305.378370][ T5151] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 305.427035][ T5100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.437559][ T5102] device veth1_macvtap entered promiscuous mode [ 305.464135][ T5056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 305.477847][ T5056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 305.487330][ T5056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 305.506407][ T5056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 305.520100][ T5056] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 305.569731][ T5094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.602175][ T5102] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 305.614116][ T5092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 305.624796][ T5092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 305.648336][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 305.657962][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.677006][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 305.686628][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.696886][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 305.705171][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 305.713171][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.722602][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.747865][ T5102] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 305.792995][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.800971][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 305.842437][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.861760][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.870722][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.892432][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 305.901077][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.918100][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.942197][ T5153] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.956985][ T5102] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.991322][ T5102] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.000108][ T5102] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.014808][ T5102] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.068597][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.078251][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.088084][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 306.107263][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 306.132707][ T5101] device veth0_vlan entered promiscuous mode [ 306.174001][ T5108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.200786][ T5101] device veth1_vlan entered promiscuous mode [ 306.231729][ T899] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 306.240217][ T899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 306.280242][ T899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.303870][ T5094] device veth0_vlan entered promiscuous mode [ 306.391455][ T5150] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 306.400085][ T5150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.411782][ T4375] Bluetooth: hci1: command 0x0419 tx timeout [ 306.416781][ T5099] Bluetooth: hci0: command 0x0419 tx timeout [ 306.432498][ T5150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.456100][ T5094] device veth1_vlan entered promiscuous mode [ 306.487001][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 306.522069][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 306.533389][ T5092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.557904][ T5101] device veth0_macvtap entered promiscuous mode [ 306.576384][ T4375] Bluetooth: hci2: command 0x0419 tx timeout [ 306.603331][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 306.622283][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 306.652182][ T5099] Bluetooth: hci4: command 0x0419 tx timeout [ 306.652790][ T4375] Bluetooth: hci3: command 0x0419 tx timeout [ 306.660797][ T5101] device veth1_macvtap entered promiscuous mode [ 306.690914][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 306.711724][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 306.722016][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 306.731764][ T4375] Bluetooth: hci5: command 0x0419 tx timeout [ 306.751093][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.762835][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 306.843213][ T5101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 306.854754][ T5101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 306.866639][ T5101] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 306.884214][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.894195][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.909077][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.918730][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.928210][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 306.937617][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 306.967051][ T5094] device veth0_macvtap entered promiscuous mode [ 307.019042][ T5101] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 307.039043][ T5101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.063072][ T5101] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 307.070539][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 307.089169][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.098504][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 307.107950][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.116862][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.125987][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 307.143905][ T5092] device veth0_vlan entered promiscuous mode [ 307.146020][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 307.167204][ T5094] device veth1_macvtap entered promiscuous mode [ 307.167349][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 307.194659][ T5101] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.205345][ T5101] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.216068][ T5101] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.224923][ T5101] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.236386][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.245357][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.253950][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 307.262699][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 307.270754][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 307.288729][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 307.300279][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.313632][ T5100] device veth0_vlan entered promiscuous mode [ 307.322909][ T26] audit: type=1400 audit(1674060857.180:96): avc: denied { mounton } for pid=5102 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=2321 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 307.336501][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 307.357873][ T26] audit: type=1400 audit(1674060857.180:97): avc: denied { mount } for pid=5102 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 307.381814][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.391774][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 307.402397][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.414798][ T5094] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 307.430651][ T5092] device veth1_vlan entered promiscuous mode [ 307.454523][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 307.463457][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.472926][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.481174][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.490564][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 307.512171][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 307.521155][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 307.534659][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 307.545490][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.556103][ T5094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 307.567239][ T5094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.585086][ T5094] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 307.614259][ T26] audit: type=1400 audit(1674060857.470:98): avc: denied { read write } for pid=5102 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 307.666003][ T26] audit: type=1400 audit(1674060857.490:99): avc: denied { open } for pid=5102 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 307.701762][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 16:54:17 executing program 1: bpf$MAP_CREATE(0x23, &(0x7f0000000180)=@bloom_filter, 0x48) [ 307.706821][ T26] audit: type=1400 audit(1674060857.490:100): avc: denied { ioctl } for pid=5102 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 307.710698][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 307.768288][ T26] audit: type=1400 audit(1674060857.600:101): avc: denied { read } for pid=5194 comm="syz-executor.1" name="ptp0" dev="devtmpfs" ino=1073 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 307.786351][ T5100] device veth1_vlan entered promiscuous mode [ 307.804728][ T5094] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.820948][ T5094] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.830495][ T26] audit: type=1400 audit(1674060857.600:102): avc: denied { open } for pid=5194 comm="syz-executor.1" path="/dev/ptp0" dev="devtmpfs" ino=1073 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 307.832100][ T5094] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 16:54:17 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000034c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) [ 307.879637][ T5094] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.880215][ T26] audit: type=1400 audit(1674060857.600:103): avc: denied { ioctl } for pid=5194 comm="syz-executor.1" path="/dev/ptp0" dev="devtmpfs" ino=1073 ioctlcmd=0x3d0a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 16:54:17 executing program 1: r0 = socket(0xa, 0x6, 0x0) sendmsg$qrtr(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x38) [ 308.015775][ T5161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 308.032605][ T5161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 308.034670][ T26] audit: type=1400 audit(1674060857.720:104): avc: denied { bpf } for pid=5196 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 308.051522][ T5161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.070499][ T5161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.102169][ T5092] device veth0_macvtap entered promiscuous mode 16:54:17 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) [ 308.114994][ T5108] device veth0_vlan entered promiscuous mode 16:54:18 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 308.164562][ T5161] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 308.183388][ T5161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.198976][ T5161] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.211915][ T5092] device veth1_macvtap entered promiscuous mode [ 308.246071][ T5127] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 308.269449][ T5108] device veth1_vlan entered promiscuous mode [ 308.273700][ T5127] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 308.293660][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 308.293680][ T26] audit: type=1400 audit(1674060858.150:109): avc: denied { create } for pid=5204 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 16:54:18 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x17}, 0x14}}, 0x0) [ 308.348336][ T26] audit: type=1400 audit(1674060858.190:110): avc: denied { read } for pid=5204 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 308.374164][ T5100] device veth0_macvtap entered promiscuous mode [ 308.402755][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 308.415241][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 308.424618][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 308.433528][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 308.445254][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 308.458371][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 308.508171][ T5100] device veth1_macvtap entered promiscuous mode [ 308.526087][ T5092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 308.540468][ T5092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.550846][ T5092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 308.562909][ T5092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.574244][ T5092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 308.585544][ T5092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.597403][ T5092] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 308.608075][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 308.616826][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 308.653107][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 308.661732][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 308.670354][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 308.689673][ T5092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 308.701932][ T5092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.712462][ T5092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 308.722980][ T5092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.733308][ T5092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 308.743849][ T5092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.755924][ T5092] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 308.767951][ T5092] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.776852][ T5092] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.785657][ T5092] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.794872][ T5092] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.826893][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 308.836174][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 308.857743][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 308.868716][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.879664][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 308.890469][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.900909][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 308.917455][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.927595][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 308.939012][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 308.954713][ T5100] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 308.974540][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 308.984916][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 309.017460][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 309.028542][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 309.038114][ T5152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 309.056094][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.067033][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.077527][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.095939][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.097498][ T26] audit: type=1400 audit(1674060858.950:111): avc: denied { create } for pid=5209 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 309.107377][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.136929][ T26] audit: type=1400 audit(1674060858.980:112): avc: denied { bind } for pid=5209 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 309.166357][ T26] audit: type=1400 audit(1674060859.020:113): avc: denied { setopt } for pid=5209 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 309.180542][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.197023][ T5100] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.207640][ T5100] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.217740][ T26] audit: type=1400 audit(1674060859.020:114): avc: denied { accept } for pid=5209 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 309.217797][ T26] audit: type=1400 audit(1674060859.020:115): avc: denied { create } for pid=5209 comm="syz-executor.3" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 309.267195][ T5100] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 309.318240][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 309.333577][ T5158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 309.360051][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 309.369499][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 309.371017][ T5100] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.397376][ T5100] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.409806][ T5100] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.430769][ T5100] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 309.458038][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.476477][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.486048][ T5160] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 309.498439][ T5108] device veth0_macvtap entered promiscuous mode [ 309.570278][ T5108] device veth1_macvtap entered promiscuous mode [ 309.620050][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.652488][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.673854][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.685202][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.696211][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.707701][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.718259][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.730784][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.741795][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 309.755240][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.766964][ T5108] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 309.802093][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 309.810528][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 309.830400][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 309.843035][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.855522][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.865968][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.879107][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.902455][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.913529][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.924542][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.935874][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.946904][ T5108] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 309.957816][ T5108] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 309.970818][ T5108] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 309.982757][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 309.991139][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.002102][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.010814][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.020444][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 310.037717][ T5108] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.048790][ T5108] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.058167][ T5108] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.067544][ T5108] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.165466][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 310.202981][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.238564][ T5208] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 310.238627][ T40] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 310.258077][ T40] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.296090][ T5208] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 310.307355][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 310.321505][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.339910][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 310.379961][ T55] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 310.392281][ T55] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.410611][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 310.539221][ T40] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 310.564876][ T40] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.794006][ T26] audit: type=1400 audit(1674060860.490:116): avc: denied { prog_load } for pid=5222 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 16:54:21 executing program 0: open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x6, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x4, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x765a1e5d, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) fcntl$getown(r3, 0x9) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x4000, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r5 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482cbae9a17ba12fc50ab1b6e3e", 0x15}], 0x1, 0x81806, 0x2) sendfile(r4, r5, 0x0, 0x100000000000042) 16:54:21 executing program 1: syz_usb_connect(0x5, 0x24, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x80, 0xd3, 0xdf, 0x8, 0x12d1, 0x1411, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd, 0x8d, 0xf4}}]}}]}}, 0x0) 16:54:21 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f00000000c0)={'b', ' *:* ', 'rwm\x00'}, 0xa) 16:54:21 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000600), &(0x7f0000000140)='./file0\x00', 0x2a43084, &(0x7f0000000240)=ANY=[@ANYBLOB="666f72636500006d61e38c9cdc32e0b177fefe8db98f303025f4ea830000000c0000001a998d04d4134be1152035b1314bcefeb9e26e025c7b72cdeb5cdf661b1203ac45", @ANYRES32=0x0], 0x3, 0x5e9, &(0x7f0000000640)="$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") setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0) 16:54:21 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x401c5820, 0x0) [ 311.490759][ T896] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 311.566631][ T26] audit: type=1400 audit(1674060861.420:117): avc: denied { mounton } for pid=5108 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=2321 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 311.663970][ T5231] loop3: detected capacity change from 0 to 1024 [ 311.681797][ T26] audit: type=1400 audit(1674060861.480:118): avc: denied { read write } for pid=5226 comm="syz-executor.1" name="raw-gadget" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 311.912596][ T5215] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 312.191997][ T5215] usb 2-1: Using ep0 maxpacket: 8 [ 312.659327][ T5215] usb 2-1: New USB device found, idVendor=12d1, idProduct=1411, bcdDevice= 0.00 [ 312.675830][ T5215] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 312.703515][ T5215] usb 2-1: Product: syz [ 312.711215][ T5215] usb 2-1: Manufacturer: syz [ 312.742203][ T5215] usb 2-1: SerialNumber: syz [ 312.810222][ T5240] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 312.815876][ T5215] usb 2-1: config 0 descriptor?? [ 312.918671][ T5215] usb-storage 2-1:0.0: USB Mass Storage device detected 16:54:22 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20000, 0x0) 16:54:22 executing program 5: open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getrlimit(0x6, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x4, 0x6, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x765a1e5d, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) fcntl$getown(r3, 0x9) mount(0x0, 0x0, &(0x7f00000002c0)='reiserfs\x00', 0x4000, 0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r5 = memfd_create(&(0x7f0000000300)='U\xffA\x05\xd6\xe7\xfc\xa3\xb0\x04\xe2\x1b\\by\xdc2\xe3ZoL\x14\xa7\x8c\'\xa7\xcf\xff\xf0+9\xac\\\xa4\xa5=\\\xcc\xf6\xc4R\x88A\x94\xe0\xff\xff\xffX\x91\x1au\x83V\xc1H\xd3\rZ\x01!b\xc0\xaeW\xc5\x1f\xec\xfd\xe3\xc1\a\xeb\\,\x98P \xf2\xfe\xc5\xf9\xd4\x9a\x16\xa6\xb2\xde\x82\xa8\xf9\xcb{\xa9m\x83\xfb\x84\x8e\xef\xe3#\xcf$Df\x89\xe2?`\x96E=-\xd6\x91,4yEE\x1d\x81\x9c\x00\x00\x00\x00\x00\x001N\x1a\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\xcc\xb8o7\t\x0e4$Lb\xf9e\x8dv\xd0Y\x86\x18\v\xd6\xf9\\-\xdc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a4\xf2\x8c\x19\x1e\xf0\xb5_\x93\x98\xb8\xcc\xc2\xc6\x15?\xa44\xd4\x12\xed\xa1\xf1!\xbch\x94\xd6\xf0\x98u\xd0#\x95y\x10\x06^\xdf\x0563\x9dX\xdcI\x06\xfe6\x1e^\"\x90\xbf\xa7&\xa3\xb5\x8d\\\xcf\xa1T\v\xd1\x92oV\x8d\xbcGd\x82\xaeD\xe0D\x10\xa9\xdb[\\eN\xbc\xb26-\xcd\xeat\xfa)\xc8\x00\x91<0\xbcf\x8b\xd5\xdb\xd9AC\xf5Z4h\x1a', 0x0) pwritev(r5, &(0x7f0000000540)=[{&(0x7f0000000040)="3f9ebe239545703482cbae9a17ba12fc50ab1b6e3e", 0x15}], 0x1, 0x81806, 0x2) sendfile(r4, r5, 0x0, 0x100000000000042) 16:54:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f00000000c0)={'b', ' *:* ', 'rwm\x00'}, 0xa) 16:54:22 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000600), &(0x7f0000000140)='./file0\x00', 0x2a43084, &(0x7f0000000240)=ANY=[@ANYBLOB="666f72636500006d61e38c9cdc32e0b177fefe8db98f303025f4ea830000000c0000001a998d04d4134be1152035b1314bcefeb9e26e025c7b72cdeb5cdf661b1203ac45", @ANYRES32=0x0], 0x3, 0x5e9, &(0x7f0000000640)="$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") setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0) 16:54:22 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f0000000140)={0x1e, 0x2, 0x0, @host}, 0x10) 16:54:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f00000000c0)={'b', ' *:* ', 'rwm\x00'}, 0xa) 16:54:22 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000540)={0x2}, 0xff85) [ 313.180487][ T5215] usb 2-1: USB disconnect, device number 2 [ 313.581874][ T5255] loop3: detected capacity change from 0 to 1024 16:54:23 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20000, 0x0) 16:54:24 executing program 5: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20000, 0x0) 16:54:24 executing program 1: syz_usb_connect(0x5, 0x24, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x80, 0xd3, 0xdf, 0x8, 0x12d1, 0x1411, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xd, 0x8d, 0xf4}}]}}]}}, 0x0) [ 314.078885][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 314.078905][ T26] audit: type=1400 audit(1674060863.930:130): avc: denied { unmount } for pid=5108 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 16:54:24 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$MRT(r0, 0x0, 0x0, 0x0, 0x0) 16:54:24 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000002140)=""/167, 0xa7) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x23e) read$FUSE(r0, &(0x7f0000008d00)={0x2020}, 0x2020) [ 314.201897][ T26] audit: type=1400 audit(1674060864.060:131): avc: denied { create } for pid=5265 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 16:54:24 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x4}, &(0x7f0000000080)={0x2}, 0x0, 0x0, 0x0) 16:54:24 executing program 4: io_uring_setup(0x0, &(0x7f00000007c0)={0x0, 0x0, 0x9c00789169e0a3e1}) [ 314.270998][ T26] audit: type=1800 audit(1674060864.080:132): pid=5268 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1158 res=0 errno=0 16:54:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0x13c, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x84, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x0, @in=@empty}]}]}, 0x13c}}, 0x0) 16:54:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', 0x0}) [ 314.360322][ T26] audit: type=1800 audit(1674060864.110:133): pid=5270 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=1170 res=0 errno=0 16:54:24 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0x7ffe}, 0xc) 16:54:24 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$afs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x26020, &(0x7f0000000240)) 16:54:24 executing program 3: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0x7) 16:54:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x3, &(0x7f0000001a40)=@framed, &(0x7f00000001c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:24 executing program 5: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 314.463875][ T26] audit: type=1400 audit(1674060864.180:134): avc: denied { getopt } for pid=5272 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.560196][ T26] audit: type=1400 audit(1674060864.320:135): avc: denied { create } for pid=5281 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 314.581345][ T899] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 314.630534][ T5293] usb usb9: usbfs: process 5293 (syz-executor.5) did not claim interface 0 before use [ 314.655506][ T26] audit: type=1400 audit(1674060864.320:136): avc: denied { write } for pid=5281 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 314.704430][ T26] audit: type=1400 audit(1674060864.320:137): avc: denied { nlmsg_write } for pid=5281 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 314.758908][ T26] audit: type=1400 audit(1674060864.390:138): avc: denied { create } for pid=5285 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 314.802895][ T26] audit: type=1400 audit(1674060864.390:139): avc: denied { bind } for pid=5285 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 314.821418][ T899] usb 2-1: Using ep0 maxpacket: 8 [ 315.109003][ T899] usb 2-1: New USB device found, idVendor=12d1, idProduct=1411, bcdDevice= 0.00 [ 315.119326][ T899] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 315.133183][ T899] usb 2-1: Product: syz [ 315.137382][ T899] usb 2-1: Manufacturer: syz [ 315.147340][ T899] usb 2-1: SerialNumber: syz [ 315.169984][ T899] usb 2-1: config 0 descriptor?? [ 315.214152][ T899] usb-storage 2-1:0.0: USB Mass Storage device detected [ 315.432622][ T5158] usb 2-1: USB disconnect, device number 3 16:54:25 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002480)={0x28, 0x4, 0x0, {0x0, 0x0, 0x5}}, 0x28) 16:54:25 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000005e80)={0x2020}, 0x2020) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:25 executing program 3: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0xa) 16:54:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x7, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 16:54:25 executing program 4: r0 = socket$inet6_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 16:54:25 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) accept4$netrom(r0, 0x0, 0x0, 0x0) 16:54:25 executing program 3: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0x8) 16:54:25 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x8, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffef, 0x1}}) 16:54:25 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:25 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x8010500d, 0x0) 16:54:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000140)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) 16:54:25 executing program 1: r0 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="f8", 0x1, r0) keyctl$read(0xb, r1, &(0x7f0000000180)=""/174, 0xae) 16:54:26 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002480)={0x28, 0x4, 0x5}, 0x28) 16:54:26 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xc0, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast}}, [@tfcpad={0x8}]}, 0xc0}}, 0x0) 16:54:26 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 16:54:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1004, 0x1, 0x7}, 0x48) 16:54:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x3a) 16:54:26 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x40025, 0x0) 16:54:26 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:26 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f0000000140)={0x1e, 0x0, 0x0, @host}, 0x10) 16:54:26 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90, 0xfffffffffffffffe, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x90) 16:54:26 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0xc0045002, 0x0) 16:54:26 executing program 0: mount$fuse(0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0) 16:54:26 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x4020940d, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:26 executing program 4: bpf$MAP_CREATE(0x1e, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:26 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_qrtr_TIOCINQ(r0, 0x8934, &(0x7f00000013c0)) 16:54:26 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$afs(&(0x7f0000000040)=@cell={0x0, 'syz0:', 'syz1'}, &(0x7f0000000100)='./file0\x00', 0x0, 0x2404, 0x0) 16:54:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000500)={0x2, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_CLIENT_FLAGS, @NBD_ATTR_TIMEOUT]}, 0x2c}}, 0x0) 16:54:26 executing program 2: bind$qrtr(0xffffffffffffffff, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:26 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x3a) 16:54:26 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x3, &(0x7f0000001740)=@framed, &(0x7f00000017c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:54:26 executing program 1: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000040)=0x2) 16:54:26 executing program 0: mq_unlink(&(0x7f0000000000)='%H@.}}%w\x00') 16:54:26 executing program 2: bind$qrtr(0xffffffffffffffff, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:26 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_qrtr_TIOCINQ(r0, 0x541b, &(0x7f00000013c0)) 16:54:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x43) 16:54:26 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x500e, 0x0) 16:54:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 16:54:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8930, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:26 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='=', @ANYBLOB=',rootmode=']) 16:54:26 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_qrtr_TIOCINQ(r0, 0x541b, &(0x7f00000013c0)) 16:54:26 executing program 2: bind$qrtr(0xffffffffffffffff, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:26 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) [ 317.172390][ T5383] fuse: Bad value for 'rootmode' 16:54:27 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 16:54:27 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$rds(r0, &(0x7f00000004c0)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000380), 0x4c, &(0x7f0000000440)=[@cswp={0x58, 0x114, 0x7, {{}, &(0x7f00000003c0), &(0x7f0000000400)}}], 0x58}, 0xc0) 16:54:27 executing program 2: socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(0xffffffffffffffff, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x0, 0x0, 0xae, 0x0, 0x1}, 0x48) 16:54:27 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, &(0x7f0000000040)={0x1d, r2}, 0x18) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r2}, 0x18) 16:54:27 executing program 5: openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) 16:54:27 executing program 3: add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 16:54:27 executing program 2: socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(0xffffffffffffffff, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:27 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/cpuinfo\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) 16:54:27 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000040)=[{}], 0x20) 16:54:27 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, &(0x7f0000000040)={0x1d, r2}, 0x18) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r2}, 0x18) 16:54:27 executing program 3: r0 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000002140), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r0, r2, r1, 0x0) 16:54:27 executing program 5: bpf$MAP_CREATE(0x22, &(0x7f0000000180)=@bloom_filter, 0x48) [ 317.554610][ T5411] fuse: blksize only supported for fuseblk 16:54:27 executing program 2: socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(0xffffffffffffffff, &(0x7f00000000c0)={0x2a, 0x1, 0xfffffffe}, 0xc) 16:54:27 executing program 1: r0 = socket(0xa, 0x3, 0x7) getsockopt$MRT(r0, 0x0, 0x0, 0x0, 0x0) 16:54:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') recvmsg$can_j1939(r0, 0x0, 0x0) 16:54:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x17, 0x2, &(0x7f0000000000)=@raw=[@map_fd], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 16:54:27 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, 0x0, 0x0) 16:54:27 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) read$FUSE(r0, &(0x7f0000006340)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000008380)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f000000a3c0)={0x2020}, 0x2020) syz_io_uring_complete(0x0) 16:54:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000280)=ANY=[]}) 16:54:27 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) read$FUSE(r0, &(0x7f0000000780)={0x2020}, 0x2020) 16:54:27 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x2, 0x0) 16:54:27 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000004240)={0x10, 0x0, 0x27}, 0x10}], 0x1}, 0x0) 16:54:27 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, 0x0, 0x0) 16:54:27 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, 0x0, 0x26) 16:54:27 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x2, 0x0) 16:54:27 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, 0x0, 0x0) 16:54:27 executing program 4: syz_open_dev$dri(&(0x7f0000000040), 0x3, 0x1) 16:54:27 executing program 0: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000200)={0x8, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcfd2]}}) 16:54:28 executing program 3: syz_open_dev$dri(&(0x7f0000000400), 0x0, 0xc00) 16:54:28 executing program 5: r0 = socket(0x22, 0x2, 0x2) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0xf0ff7f) 16:54:28 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x0, 0xfffffffe}, 0xc) 16:54:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 16:54:28 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) 16:54:28 executing program 3: r0 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000002140), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x6, r0, r2, r1, 0x0) 16:54:28 executing program 0: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="120100009ac0b620110f211066865578960109021b0001000000000904000001c6cbe800090587"], 0x0) 16:54:28 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x0, 0xfffffffe}, 0xc) 16:54:28 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:28 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) read$FUSE(r0, &(0x7f00000028c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000140)={0x18, 0x0, r1}, 0x18) 16:54:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40086602, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:28 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x0, 0xfffffffe}, 0xc) 16:54:28 executing program 1: openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040), 0x0, 0x2) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 16:54:28 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x40086602, 0x0) 16:54:28 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:28 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) 16:54:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a2, &(0x7f0000000080)={'tunl0\x00', 0x0}) [ 319.089142][ T26] kauditd_printk_skb: 37 callbacks suppressed [ 319.089164][ T26] audit: type=1400 audit(1674060868.940:177): avc: denied { setattr } for pid=5478 comm="syz-executor.3" path="/dev/dsp" dev="devtmpfs" ino=1092 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 319.122122][ T5215] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 319.134072][ T5484] vivid-002: ================= START STATUS ================= 16:54:29 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000000010"], 0x28}}, 0x0) [ 319.175976][ T5484] vivid-002: Interlaced VBI Format: false [ 319.195070][ T5484] vivid-002: ================== END STATUS ================== [ 319.411374][ T5215] usb 1-1: Using ep0 maxpacket: 32 [ 319.551668][ T5215] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x87 has invalid wMaxPacketSize 0 [ 319.731868][ T5215] usb 1-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice=86.66 [ 319.741007][ T5215] usb 1-1: New USB device strings: Mfr=85, Product=120, SerialNumber=150 [ 319.791803][ T5215] usb 1-1: Product: syz [ 319.796059][ T5215] usb 1-1: Manufacturer: syz [ 319.816924][ T5215] usb 1-1: SerialNumber: syz [ 319.873684][ T5215] usb 1-1: config 0 descriptor?? [ 319.932632][ T5215] ldusb 1-1:0.0: Interrupt in endpoint not found [ 320.143570][ T5147] usb 1-1: USB disconnect, device number 2 16:54:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:30 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) 16:54:30 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$MRT_DEL_VIF(r0, 0x6b, 0x3, 0x0, 0x4) 16:54:30 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', &(0x7f0000000180)={0x96100}, 0x18) 16:54:30 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000004240)={0x10}, 0x10}, {&(0x7f0000005d40)={0x10, 0x27, 0x1}, 0x10}], 0x2}, 0x0) 16:54:30 executing program 0: syz_open_procfs(0x0, &(0x7f0000006300)='net/bnep\x00') 16:54:30 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000140)=""/177, 0xb1) 16:54:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:30 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) 16:54:30 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) 16:54:30 executing program 3: bpf$MAP_CREATE(0x1d, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8990, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:30 executing program 4: socket$inet(0x2, 0xa, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={0x0, {}, {}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='batadv_slave_0\x00'}) 16:54:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:30 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='environ\x00') 16:54:30 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40284504, &(0x7f0000001300)=""/4093) [ 320.925205][ T26] audit: type=1800 audit(1674060870.780:178): pid=5512 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=1158 res=0 errno=0 16:54:30 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x6, 0x9, 0x0, 0x0) 16:54:30 executing program 1: r0 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xc) getpeername$qrtr(r0, 0x0, &(0x7f0000000080)=0xc) 16:54:30 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) [ 321.040836][ T5518] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 16:54:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xe8, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bb1}, [@replay_esn_val={0x1c}, @tfcpad={0x8}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0xe8}}, 0x0) [ 321.068009][ T26] audit: type=1400 audit(1674060870.920:179): avc: denied { read } for pid=5516 comm="syz-executor.3" name="event0" dev="devtmpfs" ino=833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 16:54:31 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x1a1240) 16:54:31 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:31 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$can_j1939(r0, 0x0, 0x0) 16:54:31 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xffffffffffffffda, r1}, 0x10) [ 321.177365][ T26] audit: type=1400 audit(1674060870.940:180): avc: denied { getopt } for pid=5519 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 16:54:31 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:31 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045002, 0x0) 16:54:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8924, &(0x7f0000000080)={'tunl0\x00', 0x0}) [ 321.271399][ T26] audit: type=1400 audit(1674060870.950:181): avc: denied { open } for pid=5516 comm="syz-executor.3" path="/dev/input/event0" dev="devtmpfs" ino=833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 16:54:31 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_score\x00') read$FUSE(r0, 0x0, 0x0) 16:54:31 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x11) 16:54:31 executing program 1: bpf$MAP_CREATE(0x5, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:31 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:31 executing program 2: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x80000, 0x0) 16:54:31 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0xc0045007, 0x0) [ 321.415925][ T26] audit: type=1400 audit(1674060870.950:182): avc: denied { ioctl } for pid=5516 comm="syz-executor.3" path="/dev/input/event0" dev="devtmpfs" ino=833 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 16:54:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') write$bt_hci(r0, 0x0, 0x0) 16:54:31 executing program 5: read$nci(0xffffffffffffffff, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:31 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000001, 0x29032, 0xffffffffffffffff, 0x10000000) 16:54:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @dev}}}}) [ 321.558293][ T26] audit: type=1400 audit(1674060871.030:183): avc: denied { connect } for pid=5524 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 16:54:31 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045017, 0x0) 16:54:31 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x809000, &(0x7f0000000080)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}, 0x0, 0x0, 0x0) 16:54:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:31 executing program 3: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCGETSGCNT(r0, 0x8906, 0x0) 16:54:31 executing program 4: bpf$MAP_CREATE(0x11, &(0x7f0000000040)=@bloom_filter, 0x48) 16:54:31 executing program 5: read$nci(0xffffffffffffffff, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) [ 321.681997][ T26] audit: type=1400 audit(1674060871.130:184): avc: denied { bind } for pid=5534 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 16:54:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8932, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:31 executing program 2: r0 = socket(0x2b, 0x1, 0x0) bind$can_j1939(r0, 0x0, 0x0) 16:54:31 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x0) [ 321.772568][ T26] audit: type=1800 audit(1674060871.440:185): pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=1165 res=0 errno=0 16:54:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}}}) 16:54:31 executing program 5: read$nci(0xffffffffffffffff, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:31 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0x9) [ 321.877043][ T26] audit: type=1400 audit(1674060871.680:186): avc: denied { ioctl } for pid=5570 comm="syz-executor.3" path="socket:[33386]" dev="sockfs" ino=33386 ioctlcmd=0x8906 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 16:54:31 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x20, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}}, 0x0) 16:54:31 executing program 4: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)={0x420c1}, 0x18) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18}, 0x18) 16:54:31 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0xc0045006, 0x0) 16:54:31 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x2, &(0x7f0000000080)={'tunl0\x00', 0x0}) [ 322.025516][ T1210] ieee802154 phy0 wpan0: encryption failed: -22 [ 322.031938][ T1210] ieee802154 phy1 wpan1: encryption failed: -22 16:54:31 executing program 4: r0 = socket(0x11, 0x2, 0x0) getpeername$qrtr(r0, 0x0, 0x0) 16:54:31 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:54:32 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x801c581f, 0x0) 16:54:32 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x104000, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x11002, 0x0) 16:54:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)={0x18, 0x140c, 0x201, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x4}]}, 0x18}}, 0x0) 16:54:32 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x4, 0x0, &(0x7f0000000040)) [ 322.264097][ T5605] usb usb9: usbfs: process 5605 (syz-executor.2) did not claim interface 0 before use 16:54:32 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000005540)={&(0x7f0000003d00), 0xc, &(0x7f00000053c0)=[{0x0, 0xffffffffffffffe2}, {&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/126, 0x7e}, {0x0}, {0x0}, {&(0x7f00000052c0)=""/201, 0xc9}], 0x6, &(0x7f0000005480)=ANY=[@ANYBLOB="88000057a4c25fa2e4b500000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000002100"/136], 0x88}, 0x38, 0x20) 16:54:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 1: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x2) write$qrtrtun(r0, 0x0, 0x0) 16:54:32 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x44000, 0x0) [ 322.394719][ T5613] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 16:54:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(0xffffffffffffffff, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast}}}, 0xb8}}, 0x0) 16:54:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') ioctl$PPPIOCATTACH(r0, 0x4004743d, 0x0) 16:54:32 executing program 0: bpf$MAP_CREATE(0x15, &(0x7f0000000040)=@bloom_filter, 0x48) 16:54:32 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x97) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) 16:54:32 executing program 4: syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x20000, &(0x7f0000000140)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}, 0x0, 0x0, 0x0) 16:54:32 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x1000, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x40000, 0x0) 16:54:32 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x97) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) 16:54:32 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004440)={0x2020}, 0x2020) 16:54:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(0xffffffffffffffff, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) setresuid(0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:54:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x5, &(0x7f0000000140)=@framed={{}, [@cb_func]}, &(0x7f0000000200)='syzkaller\x00', 0x1, 0x95, &(0x7f0000000240)=""/149, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:32 executing program 0: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$VIDIOC_G_CROP(r0, 0x40086602, &(0x7f00000002c0)) 16:54:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(0xffffffffffffffff, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000100)=0xffff1948) 16:54:32 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x4, &(0x7f0000001a40)=@framed={{}, [@generic={0x5}]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 322.863390][ T5650] usb usb9: usbfs: process 5650 (syz-executor.4) did not claim interface 0 before use 16:54:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 3: r0 = socket$inet(0x2, 0x3, 0x6) getsockopt$MRT(r0, 0x0, 0xce, 0x0, 0x0) 16:54:32 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f00000025c0)={0x90}, 0x87) 16:54:32 executing program 4: syz_emit_ethernet(0x23bf, &(0x7f0000000f40)={@remote, @empty, @val, {@ipv6}}, 0x0) 16:54:32 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000100)=0xffff1948) 16:54:32 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCGETSGCNT(r0, 0x89e1, &(0x7f0000000040)={@loopback, @multicast1}) 16:54:32 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:32 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x40045010, 0x0) 16:54:32 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') syz_open_procfs(0x0, &(0x7f0000000080)='fd/4\x00') 16:54:33 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000003700)={0x0, 0x0, 0x0, 0x2}, 0x38, 0x0) 16:54:33 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x444182) 16:54:33 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$pppl2tp(r0, 0x0, 0x0) 16:54:33 executing program 4: syz_open_procfs(0x0, &(0x7f00000004c0)='attr/prev\x00') 16:54:33 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x84000, 0x0) 16:54:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') read$FUSE(r0, &(0x7f00000022c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000006340)={0x2020}, 0x2020) 16:54:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}}}) 16:54:33 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:33 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000000c0)=""/189, 0xbd}], 0x1}}], 0x1, 0x0, 0x0) 16:54:33 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0x13c, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x84, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x2, @in=@empty}]}]}, 0x13c}}, 0x0) 16:54:33 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 16:54:33 executing program 3: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$can_j1939(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 16:54:33 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000024c0), 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000002500)=0x9) 16:54:33 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:33 executing program 4: request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 16:54:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8971, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x8, 0x3, 0x0, 0x2}, 0x48) 16:54:33 executing program 2: bpf$MAP_CREATE(0x4, &(0x7f0000000180)=@bloom_filter, 0xc) 16:54:33 executing program 4: syz_mount_image$fuse(&(0x7f0000002340), &(0x7f0000002380)='./file0\x00', 0x0, &(0x7f00000023c0), 0x0, 0x0, 0x0) 16:54:33 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) [ 323.732730][ T5717] fuse: Bad value for 'fd' 16:54:34 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)={0x18, 0x140c, 0x201, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x300}]}, 0x18}}, 0x0) 16:54:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8942, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:34 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000003700)={0x0, 0x0, 0x0, 0x40000}, 0x38, 0x0) 16:54:34 executing program 0: r0 = socket$inet6_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00'}) 16:54:34 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, 0x0, 0x0) 16:54:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x2, &(0x7f0000000000)=@raw=[@map_fd], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000280)=ANY=[]}) 16:54:34 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) 16:54:34 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x6, &(0x7f0000001a40)=@framed={{}, [@generic={0x5}, @alu, @generic={0x5, 0x0, 0x0, 0x800}]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:34 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, 0x0, 0x0) 16:54:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) setresuid(0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:34 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x5, &(0x7f0000000140)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000200)='syzkaller\x00', 0x1, 0x95, &(0x7f0000000240)=""/149, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 324.568025][ T5736] usb usb9: usbfs: process 5736 (syz-executor.0) did not claim interface 0 before use 16:54:34 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='children\x00') 16:54:34 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004280)={0x2020}, 0x2020) 16:54:34 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, 0x0, 0x0) 16:54:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) setresuid(0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:34 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x10}}, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000004240)={0x458, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x151, 0x0, 0x0, 0x1, [@generic="422bbf2b4db256510a16a65468bf06c0a49acf9c9ebdbb1c54ca337e94e4be7645cb3391ff0cb06d7f33352ab13410529f7265a54d077575953946f7944351b1332a437bf3d33be9cf80e57962cfdbc5d621663550f4f57ff5fdfddf9ef358db88b46d99caf3321e4f965fc835e4b400aa06905ca20fb1c0916604bbeeb619848cf4c4691f4f1681295d8525", @generic="8481bcae1634c8aa27ff4157bf098d90760d765e4be37b6938a46bd46e9945c699db2d112867aee0af3c102a5f9f960862f21115b15243c2cea98fdb4180040caeb83de4ad1c5685d64edf45e0985136ec8397badb107b27f43f17c6a3ce097c4672b88927ef294c7cd030e0586974881a017a57cdc5ce6c8e792f2047a03b88317f34a9c1bb7a6981d6ef80683d476ce3a388cc7da7cad908cb00cfe12ca582b4f573503c755127c9c928020799e2667ada22af5aaba991af42e2dd124a30a8a0"]}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, @generic="a80c10e1db05a9806d78fe9f8d8451fc7423b4b73fd60651de53cb841b6c96fdcda7d2b6776086458a4ea6bf06d55af39989c50051804905e40f9b915121fc8a4f58aaabd491f15f7de54adef5946b046b035da191180dcda8adfd1a44f2f450079bc8e5ce2d07e4cca15cb1317b49931050afd0df51f653619657aa14e2dd7c1486ff9d1b107f47643752fac130ad1308304c780717b81a59f15470d539438620f4e41366fabbc1cc65de97961deb4aed640cc7e9d7887e4c1ab6c4ca60b7d9e709a68e", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x69, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="db8cc7720a5dfaafd3195802127e0eff0f3fd1e79c27b82fd930610b60700df557c94f738f86c3e0ef74a2e16cc4092b1b152ea99fef09740975a65f27ecdb3b97a41cc4fc", @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @nested={0x129, 0x0, 0x0, 0x1, [@generic="de86c96e0db6f5f75d47b4b8f2d40cb45646e03f64632329df8ec3444176d7a7adc07d4c026922287d0555ca84c055e7fec77084a2c244b27370203c4451a88228bf6bcfb1719fdadbdece26206d32ed732f39544f5fcb5e934eddf66abe2a4bcbbcd13dbf72593489f6bc4705d040c9f787b23c1f74f12879f1f907b1a3d4e51c34964a7fb01c93de38d899eaab7a54f02e407a73732fb8cc3507fb50424da56fa135ac2f99bef0841d76b5ec3a0df904c2f873532fe320eef7dfacf094bfdcbf82aadab1e5af09085f61d8383d8aadfe2efaa01e400bb8e0bd3ab980ca0f1e8ae31e5ec779608c", @generic="79b4a93862d1ae7a1db8be2e1a610fb3a4e670af907b30180f0d65e12359dd7c8010e387d9eec29664005ed8f282aca05f64c765fd14d42c2b1e59f88e"]}, @typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @generic="8fb0458c7b255675478906cd832f9f17fe26d1d76010c994dcb58bb79ffae9d5d46f00709e6113242b55c1467418498f44fc2b19afaee3d0b73e8fe74e4bce4db7d16db84cc988268f0f6c66a4751a0e8724dde778dc94ef1e199dd2df312f3ee22ca9decb", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}]}, 0x458}, {&(0x7f0000000080)={0x64, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x51, 0x0, 0x0, 0x1, [@generic="81074b94cddb6f8b2ff051c52a473d17a11c00c61062658608f5d410d2722c679530f460104ac1f67cd58342b32c329dc419", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="9d0d97495358b8c593dd4b", @typed={0x8, 0x0, 0x0, 0x0, @u32}]}]}, 0x64}, {&(0x7f00000046c0)={0x494, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="ceeecb99ac158f08c6ba32cb89c09a1af8d960b0030f3afe4ab6e111060c5cbca4a6510edf5ee544624e467b21bb919c95e1159828eab0d0df7cc9830b9843cd8541b27d69b50c142987485dce8f0a87feab6bee2db0e2d4a6196e2b8f6a8f0487a47e7a3faa162fef2af992c47413fb9aa97f3bf8a784255c12cf8f5fe7692ea9a715c76c55b0f49edf7971aeb135296974ff10db89ab6f8b89d6cd99d9388f53cb8393ba6f7e51a472097430b3dae88095008f64290f238bbb746f2098018d6477f389bf08837d5d266960a0037f2f65805275d64389cf10d7fcc6df5392f2effffd847e3e18bbf4", @nested={0x38d, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="dfdd97dbcba4b355709657221facf312b6148e98ed9323ff2c40595e33110bde441996f33b9e5fc36b637d72dee9a6f2a175ac4dfc3529dd2e8961363bd2f6e6774bbf9caa2a4c3afc90867c86a1aeb8a3d3f283b58c541a8d75a85f0ff914e5b4d10e5aa2cff312e403941eaa47d7299aa651bb98f5eb68292b004969c951aad25e87450ade96fc2afec92800cfd4eb5b37cc7f78bbbc825aabc09c74b1fabe1214a0456e4967d4cb1fc77fa43d", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="f56616a32eafef51758a69827191baddb896af65e264889e9b32a45dbb8ee151b22e9afc8595daa7b675b83d6b2ad952733225ca07232fdb2ff3d7859049bcf9d4f9149f55618068b2e4eeeb1932f93ac69cc3ccd119255f1ada488df822fe80d1afecf09c44efa2ce27b8b9f8cc6ee0c87c84feabc2d7c9391529c8a9f3b5178691e1dc257e871db2586cef2080bf62388347e14c7e161a29c82a329215a97573d59e7c4450a64df3ee26ab6e49f85e9c95e31567fe8b98b83512747d908b3978e021", @generic="9280493ec32834199a30269be293de4dac1c3edd7c33de0ce3fe72a3949a0e8242ba2ec699ed4c5785", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="4a65acb8faf35365dfe12ed6c5f5758b98dd99f88a51d5d8218559bd32075e17188ef2139a437fe666fd6ddb89fb33d5be242e72390973ade97c7dc57ca6557de10baf7130823bafa06c47b44969353857eee4e0a56eaef49cb057612ffc63d051498adf6c4f1fd182f10f57ce75cb442e37dfa1ccac36f71188623ec12c937edebe3aecd984be23d9ba563e2453d26bb938d1cd1cbd444c212e9e40d05e138500d387b180eb4adf85275f8a026d8c0f684fd38d4d4c59bd79283c7832891fb3c7c1f7fc35a7f05e24822dae242e1ea8a007c009aa75fffb2a00127ce638", @generic="88a8adc45a03d48cc486d164274a27639dd02fd625a8e6603d3973e6dae1ffa30f32f20d68444d01e40663", @generic="f9c9b28ed7b8435c1cb689b38c5d0a005421950898c1b251a5ac0ce19089b1801ad39be99dd336b831e1240f817cce6a7d3c93ef4d39b9adb07b7acc1505e6dcbf8ff08667cceeddf8806362adcbed97e428a9636e4928df3fae7969ee1195dfc859f0e4bd84c90aadb2d3a43ef2cafb601ed6ed54590a1861d164fb95638c33b6adbaee2dc35f1508dfd28e5052c4a934eb21eab6bc07d676465cf53b039c302cab5fee61f90ee36dde06f90e76f209d1fe0a1efa450645262b5af1b9fc3135e18a", @typed={0x5, 0x0, 0x0, 0x0, @binary='S'}]}]}, 0x494}, {&(0x7f0000005d40)={0x574, 0x0, 0x1, 0x0, 0x0, "", [@generic="dfbfdacf56fb42e08a3cc8670482e5d4d93a5ce7857f7bed8c4afbcd9be17776b7e7b04e6ef0e94d003dd3e614f4905e88aa7f842524c0035c8dc9b036c0820fb782fc8fc1ab7e68cc2b0c38e740e4681d3835163f09c526243ba9805a1f53bcd9af3a27a3407830c2c1a1eec01f0001c507369bf570acf7574b037f0104b071aa20af2d39269fba844c49275dccb701dd4e29783bb90a15c25c2b1eb0ff0eb5742786d7b988fd0123d00290246afb72279dbe2538676d8175363f5ab119df655fee5dc78442363808deaceaa77cfe57ae8e99b3e58faf14a0c57dd491e4212a9e6a792d13636c0cd5018bd5d6bae7b7ae", @nested={0x319, 0x0, 0x0, 0x1, [@generic="7240dc8c3ac9fdefd4eaa13ede0aaf400e1b1b370c5975ae09a28139fd0ff4e0095706e98015a4271cf44d54a6429adda276c9639687faae14d6a9ea984017c81d230f7ce3ab704b24a02cbda0d5dfa7e34cf1f5e26aa3ab2278fe1d1aa02b8de54c249c411b02028fd9b31361c4b73c0a468d3b9732a3959ac5cb5963a012c4ad0ea797c04d768a7f9341e8d6b5b9359196b9a12bfba4a3dc4d749983e10b7d337caa642e5e1878990648c3f80c8df78f18d6d551c5516c25aa863e4bb804a9a9ec908bd0ba1730c6725af3c424bbc69239032c4f9280", @typed={0xd1, 0x0, 0x0, 0x0, @binary="bbaa24fc3f19465dce8ef24034a6ec01fc2cbaccf1bc97582ebfb847dcac312d14a395d0a62403f9e5ccbdf03f3f8fb6783aeb032cd3ceeedf089c83e550d56b690cd4343e8e57399a9d8e5ffb60d8f3455fc57a81684157dbae66ca41d81a982faf5e275e0c05825a871ac2902c3046205b6bedc4180b1ad431eb13236ad186a326c04cdead83355e4066219c86006720a80b22c197f08ed9d481ae423c2ef3f2f6dcaa881bf196d798b16e5731704c578d2bbde40e79e70d5cf11f9738c8ed14924963d77a0c6f0859ad80c3"}, @generic="233f9dd5afc91e17604ad13e52fe79923d812fe74c74ff6ab8056fb1232c8140670f881175d9f5c8d42c71b2e9306676313a28a1581c90", @generic="ba1ee52260b5492f08b9faaca240425b612883047454efbeba28304fdcb1d81f58cad3c8cd3713a6782f24276e091fa5eea4d6026f45630bd6cc8bf24400e4a783fa02bfbac4eea2f7fe17721f431d8b765dbf8dd8ddee75175966833c852890c8f1fcb952feac91e3de51b876e4679e7122ac9534eab4ecf5bc1210f5c26378eca2da3319c28cb626b7983d76167c90576d0a2920c6e8b4e4db2e7bc34820dfa4bc568d63a43730c73fc231f185204f945cd471d72d30321a14cafdc7fe3f1c15", @generic="b406839c846e25734eac51abc0be08f2dca73ab21850e8118ed6546a905e7aea301d28d846fa41af15112e66131648e379f7cae7a3c9fa4c8faefe66c32b54152c0a190e889c3bdbfd9c50df3d65821381782ee335517df2b93038d17438fed5c9c5c1146841677c08e05b810ce856a383e5"]}, @typed={0xb9, 0x0, 0x0, 0x0, @binary="1acbff91e704ddb4632e1ffeffd40a4b7085f158a6c5301e87a3188b7f957546a4d711ae60e9b655a46c87cc5f7701a576b09c41f8b6741d17ab0db0c208b8a3cbfe5896f54697cfe1f9770f71a819c651c446f739d7ee6fd5b73384aa8908408f9242f9bc9c62b80e541b7dec6fa9b98a4f5a85c11eb5676fefc7c136ef384a074cffdd2031d0c6bf3b9f5653618ab8fbc4d4470fd4acb8cc69c92ab37497c98cedd19754cb04475d873a24734c0ebeb0dfabaf07"}, @typed={0x95, 0x0, 0x0, 0x0, @binary="c877eb7b5574b7eca6178916e149bc9fc30feb4bef25274ba4b7cbb8e51b9c0a197a0910c73677680746f0fcb5b666e7c1e6cb332f14d7e3ebf5f0ec8eac18b120574164c822369bc62a115a73e8906393c698d248507fb4490313056b329499e92091470ba88ce06e542f6ed527ed6038080e2077355404731e7ad59bd70b4b175c63c2edae7df525138f6f56f19d97da"}]}, 0x574}], 0x4}, 0x0) 16:54:34 executing program 1: socket$inet6_udplite(0x2, 0x2, 0x88) 16:54:34 executing program 4: r0 = socket(0x18, 0x0, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000004140)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 16:54:34 executing program 5: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCGETSGCNT(r0, 0x80108907, 0x0) 16:54:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x40049409, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:34 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x10, 0x201}, 0x10}}, 0x0) 16:54:34 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0x6) [ 324.893488][ T5751] usb usb9: usbfs: process 5751 (syz-executor.0) did not claim interface 0 before use 16:54:34 executing program 2: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfsfloor}, {@smackfsfloor}]}}, 0x0, 0x0, 0x0) 16:54:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) setresuid(0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:34 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1000000001140155"], 0x10}}, 0x0) [ 325.014440][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 325.014461][ T26] audit: type=1400 audit(1674060874.870:195): avc: denied { write } for pid=5758 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 16:54:34 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCGETSGCNT(r0, 0x541b, 0x0) 16:54:34 executing program 5: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$can_j1939(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)="b3", 0x1}}, 0x84054) 16:54:35 executing program 1: socket$inet6_udplite(0x2, 0x3, 0x88) [ 325.166990][ T5767] usb usb9: usbfs: process 5767 (syz-executor.0) did not claim interface 0 before use 16:54:35 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="500000000c1401020000000000000000080001"], 0x50}}, 0x0) 16:54:35 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) [ 325.215422][ T5775] fuse: Bad value for 'fd' 16:54:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) setresuid(0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:35 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0), 0x41) 16:54:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8995, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:35 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/sem\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8929, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) [ 325.348683][ T5778] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.3'. [ 325.384253][ T5784] usb usb9: usbfs: process 5784 (syz-executor.0) did not claim interface 0 before use 16:54:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) write$FUSE_LK(r0, &(0x7f0000002880)={0x28}, 0xffffffffffffff90) 16:54:35 executing program 1: ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) 16:54:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006fc0)={0x0, 0x0, &(0x7f0000006f80)=[{&(0x7f0000007000)=ANY=[@ANYBLOB="c0190000100001"], 0x19c0}], 0x1}, 0x0) 16:54:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:35 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f00000032c0)={0x0, 0x0, 0x0}, 0x12142) 16:54:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000006, 0x13, r0, 0x10000000) [ 325.519421][ T26] audit: type=1800 audit(1674060875.370:196): pid=5795 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=1173 res=0 errno=0 16:54:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8949, &(0x7f0000000080)={'tunl0\x00', 0x0}) [ 325.603278][ T5801] netlink: 6560 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.622052][ T5800] usb usb9: usbfs: process 5800 (syz-executor.0) did not claim interface 0 before use 16:54:35 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x140c, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x5b}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x38}}, 0x0) [ 325.655827][ T26] audit: type=1400 audit(1674060875.510:197): avc: denied { map } for pid=5804 comm="syz-executor.5" path="/proc/5804/net/ptype" dev="proc" ino=4026533135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 16:54:35 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 16:54:35 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 16:54:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) [ 325.758239][ T26] audit: type=1400 audit(1674060875.540:198): avc: denied { execute } for pid=5804 comm="syz-executor.5" path="/proc/5804/net/ptype" dev="proc" ino=4026533135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 16:54:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x4, 0x0, &(0x7f0000000040)=0x2) 16:54:35 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCGETSGCNT(r0, 0x89e1, 0x0) 16:54:35 executing program 5: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x40000, 0x0) 16:54:35 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) [ 325.841327][ T5814] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 16:54:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:35 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000006700)={0x2020}, 0x2020) 16:54:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002480)={0x28, 0x3}, 0x28) 16:54:35 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0x2) [ 326.027403][ T26] audit: type=1800 audit(1674060875.880:199): pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=1158 res=0 errno=0 16:54:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x40086602, &(0x7f0000001300)=""/4093) 16:54:35 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:35 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x8004500b, 0x0) 16:54:36 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f00000002c0)={0xa}) 16:54:36 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000003c0)={0x2020}, 0x2020) [ 326.182766][ T26] audit: type=1400 audit(1674060876.040:200): avc: denied { setattr } for pid=5833 comm="syz-executor.5" path="/dev/input/event0" dev="devtmpfs" ino=833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 16:54:36 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:36 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$MRT_DEL_VIF(r0, 0x6b, 0xcb, 0x0, 0x0) 16:54:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 16:54:36 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x10}}, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000004240)={0x458, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x151, 0x0, 0x0, 0x1, [@generic="422bbf2b4db256510a16a65468bf06c0a49acf9c9ebdbb1c54ca337e94e4be7645cb3391ff0cb06d7f33352ab13410529f7265a54d077575953946f7944351b1332a437bf3d33be9cf80e57962cfdbc5d621663550f4f57ff5fdfddf9ef358db88b46d99caf3321e4f965fc835e4b400aa06905ca20fb1c0916604bbeeb619848cf4c4691f4f1681295d8525", @generic="8481bcae1634c8aa27ff4157bf098d90760d765e4be37b6938a46bd46e9945c699db2d112867aee0af3c102a5f9f960862f21115b15243c2cea98fdb4180040caeb83de4ad1c5685d64edf45e0985136ec8397badb107b27f43f17c6a3ce097c4672b88927ef294c7cd030e0586974881a017a57cdc5ce6c8e792f2047a03b88317f34a9c1bb7a6981d6ef80683d476ce3a388cc7da7cad908cb00cfe12ca582b4f573503c755127c9c928020799e2667ada22af5aaba991af42e2dd124a30a8a0"]}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}]}, @generic="a80c10e1db05a9806d78fe9f8d8451fc7423b4b73fd60651de53cb841b6c96fdcda7d2b6776086458a4ea6bf06d55af39989c50051804905e40f9b915121fc8a4f58aaabd491f15f7de54adef5946b046b035da191180dcda8adfd1a44f2f450079bc8e5ce2d07e4cca15cb1317b49931050afd0df51f653619657aa14e2dd7c1486ff9d1b107f47643752fac130ad1308304c780717b81a59f15470d539438620f4e41366fabbc1cc65de97961deb4aed640cc7e9d7887e4c1ab6c4ca60b7d9e709a68e", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x69, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="db8cc7720a5dfaafd3195802127e0eff0f3fd1e79c27b82fd930610b60700df557c94f738f86c3e0ef74a2e16cc4092b1b152ea99fef09740975a65f27ecdb3b97a41cc4fc", @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @nested={0x129, 0x0, 0x0, 0x1, [@generic="de86c96e0db6f5f75d47b4b8f2d40cb45646e03f64632329df8ec3444176d7a7adc07d4c026922287d0555ca84c055e7fec77084a2c244b27370203c4451a88228bf6bcfb1719fdadbdece26206d32ed732f39544f5fcb5e934eddf66abe2a4bcbbcd13dbf72593489f6bc4705d040c9f787b23c1f74f12879f1f907b1a3d4e51c34964a7fb01c93de38d899eaab7a54f02e407a73732fb8cc3507fb50424da56fa135ac2f99bef0841d76b5ec3a0df904c2f873532fe320eef7dfacf094bfdcbf82aadab1e5af09085f61d8383d8aadfe2efaa01e400bb8e0bd3ab980ca0f1e8ae31e5ec779608c", @generic="79b4a93862d1ae7a1db8be2e1a610fb3a4e670af907b30180f0d65e12359dd7c8010e387d9eec29664005ed8f282aca05f64c765fd14d42c2b1e59f88e"]}, @typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @generic="8fb0458c7b255675478906cd832f9f17fe26d1d76010c994dcb58bb79ffae9d5d46f00709e6113242b55c1467418498f44fc2b19afaee3d0b73e8fe74e4bce4db7d16db84cc988268f0f6c66a4751a0e8724dde778dc94ef1e199dd2df312f3ee22ca9decb", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}]}, 0x458}, {&(0x7f0000000080)={0x64, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x51, 0x0, 0x0, 0x1, [@generic="81074b94cddb6f8b2ff051c52a473d17a11c00c61062658608f5d410d2722c679530f460104ac1f67cd58342b32c329dc419", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="9d0d97495358b8c593dd4b", @typed={0x8, 0x0, 0x0, 0x0, @u32}]}]}, 0x64}, {&(0x7f00000046c0)={0x494, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="ceeecb99ac158f08c6ba32cb89c09a1af8d960b0030f3afe4ab6e111060c5cbca4a6510edf5ee544624e467b21bb919c95e1159828eab0d0df7cc9830b9843cd8541b27d69b50c142987485dce8f0a87feab6bee2db0e2d4a6196e2b8f6a8f0487a47e7a3faa162fef2af992c47413fb9aa97f3bf8a784255c12cf8f5fe7692ea9a715c76c55b0f49edf7971aeb135296974ff10db89ab6f8b89d6cd99d9388f53cb8393ba6f7e51a472097430b3dae88095008f64290f238bbb746f2098018d6477f389bf08837d5d266960a0037f2f65805275d64389cf10d7fcc6df5392f2effffd847e3e18bbf4", @nested={0x38d, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="dfdd97dbcba4b355709657221facf312b6148e98ed9323ff2c40595e33110bde441996f33b9e5fc36b637d72dee9a6f2a175ac4dfc3529dd2e8961363bd2f6e6774bbf9caa2a4c3afc90867c86a1aeb8a3d3f283b58c541a8d75a85f0ff914e5b4d10e5aa2cff312e403941eaa47d7299aa651bb98f5eb68292b004969c951aad25e87450ade96fc2afec92800cfd4eb5b37cc7f78bbbc825aabc09c74b1fabe1214a0456e4967d4cb1fc77fa43d", @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="f56616a32eafef51758a69827191baddb896af65e264889e9b32a45dbb8ee151b22e9afc8595daa7b675b83d6b2ad952733225ca07232fdb2ff3d7859049bcf9d4f9149f55618068b2e4eeeb1932f93ac69cc3ccd119255f1ada488df822fe80d1afecf09c44efa2ce27b8b9f8cc6ee0c87c84feabc2d7c9391529c8a9f3b5178691e1dc257e871db2586cef2080bf62388347e14c7e161a29c82a329215a97573d59e7c4450a64df3ee26ab6e49f85e9c95e31567fe8b98b83512747d908b3978e021", @generic="9280493ec32834199a30269be293de4dac1c3edd7c33de0ce3fe72a3949a0e8242ba2ec699ed4c5785", @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="4a65acb8faf35365dfe12ed6c5f5758b98dd99f88a51d5d8218559bd32075e17188ef2139a437fe666fd6ddb89fb33d5be242e72390973ade97c7dc57ca6557de10baf7130823bafa06c47b44969353857eee4e0a56eaef49cb057612ffc63d051498adf6c4f1fd182f10f57ce75cb442e37dfa1ccac36f71188623ec12c937edebe3aecd984be23d9ba563e2453d26bb938d1cd1cbd444c212e9e40d05e138500d387b180eb4adf85275f8a026d8c0f684fd38d4d4c59bd79283c7832891fb3c7c1f7fc35a7f05e24822dae242e1ea8a007c009aa75fffb2a00127ce638", @generic="88a8adc45a03d48cc486d164274a27639dd02fd625a8e6603d3973e6dae1ffa30f32f20d68444d01e40663", @generic="f9c9b28ed7b8435c1cb689b38c5d0a005421950898c1b251a5ac0ce19089b1801ad39be99dd336b831e1240f817cce6a7d3c93ef4d39b9adb07b7acc1505e6dcbf8ff08667cceeddf8806362adcbed97e428a9636e4928df3fae7969ee1195dfc859f0e4bd84c90aadb2d3a43ef2cafb601ed6ed54590a1861d164fb95638c33b6adbaee2dc35f1508dfd28e5052c4a934eb21eab6bc07d676465cf53b039c302cab5fee61f90ee36dde06f90e76f209d1fe0a1efa450645262b5af1b9fc3135e18a", @typed={0x5, 0x0, 0x0, 0x0, @binary='S'}]}]}, 0x494}, {&(0x7f0000005d40)={0x574, 0x27, 0x1, 0x0, 0x0, "", [@generic="dfbfdacf56fb42e08a3cc8670482e5d4d93a5ce7857f7bed8c4afbcd9be17776b7e7b04e6ef0e94d003dd3e614f4905e88aa7f842524c0035c8dc9b036c0820fb782fc8fc1ab7e68cc2b0c38e740e4681d3835163f09c526243ba9805a1f53bcd9af3a27a3407830c2c1a1eec01f0001c507369bf570acf7574b037f0104b071aa20af2d39269fba844c49275dccb701dd4e29783bb90a15c25c2b1eb0ff0eb5742786d7b988fd0123d00290246afb72279dbe2538676d8175363f5ab119df655fee5dc78442363808deaceaa77cfe57ae8e99b3e58faf14a0c57dd491e4212a9e6a792d13636c0cd5018bd5d6bae7b7ae", @nested={0x319, 0x0, 0x0, 0x1, [@generic="7240dc8c3ac9fdefd4eaa13ede0aaf400e1b1b370c5975ae09a28139fd0ff4e0095706e98015a4271cf44d54a6429adda276c9639687faae14d6a9ea984017c81d230f7ce3ab704b24a02cbda0d5dfa7e34cf1f5e26aa3ab2278fe1d1aa02b8de54c249c411b02028fd9b31361c4b73c0a468d3b9732a3959ac5cb5963a012c4ad0ea797c04d768a7f9341e8d6b5b9359196b9a12bfba4a3dc4d749983e10b7d337caa642e5e1878990648c3f80c8df78f18d6d551c5516c25aa863e4bb804a9a9ec908bd0ba1730c6725af3c424bbc69239032c4f9280", @typed={0xd1, 0x0, 0x0, 0x0, @binary="bbaa24fc3f19465dce8ef24034a6ec01fc2cbaccf1bc97582ebfb847dcac312d14a395d0a62403f9e5ccbdf03f3f8fb6783aeb032cd3ceeedf089c83e550d56b690cd4343e8e57399a9d8e5ffb60d8f3455fc57a81684157dbae66ca41d81a982faf5e275e0c05825a871ac2902c3046205b6bedc4180b1ad431eb13236ad186a326c04cdead83355e4066219c86006720a80b22c197f08ed9d481ae423c2ef3f2f6dcaa881bf196d798b16e5731704c578d2bbde40e79e70d5cf11f9738c8ed14924963d77a0c6f0859ad80c3"}, @generic="233f9dd5afc91e17604ad13e52fe79923d812fe74c74ff6ab8056fb1232c8140670f881175d9f5c8d42c71b2e9306676313a28a1581c90", @generic="ba1ee52260b5492f08b9faaca240425b612883047454efbeba28304fdcb1d81f58cad3c8cd3713a6782f24276e091fa5eea4d6026f45630bd6cc8bf24400e4a783fa02bfbac4eea2f7fe17721f431d8b765dbf8dd8ddee75175966833c852890c8f1fcb952feac91e3de51b876e4679e7122ac9534eab4ecf5bc1210f5c26378eca2da3319c28cb626b7983d76167c90576d0a2920c6e8b4e4db2e7bc34820dfa4bc568d63a43730c73fc231f185204f945cd471d72d30321a14cafdc7fe3f1c15", @generic="b406839c846e25734eac51abc0be08f2dca73ab21850e8118ed6546a905e7aea301d28d846fa41af15112e66131648e379f7cae7a3c9fa4c8faefe66c32b54152c0a190e889c3bdbfd9c50df3d65821381782ee335517df2b93038d17438fed5c9c5c1146841677c08e05b810ce856a383e5"]}, @typed={0xb9, 0x0, 0x0, 0x0, @binary="1acbff91e704ddb4632e1ffeffd40a4b7085f158a6c5301e87a3188b7f957546a4d711ae60e9b655a46c87cc5f7701a576b09c41f8b6741d17ab0db0c208b8a3cbfe5896f54697cfe1f9770f71a819c651c446f739d7ee6fd5b73384aa8908408f9242f9bc9c62b80e541b7dec6fa9b98a4f5a85c11eb5676fefc7c136ef384a074cffdd2031d0c6bf3b9f5653618ab8fbc4d4470fd4acb8cc69c92ab37497c98cedd19754cb04475d873a24734c0ebeb0dfabaf07"}, @typed={0x95, 0x0, 0x0, 0x0, @binary="c877eb7b5574b7eca6178916e149bc9fc30feb4bef25274ba4b7cbb8e51b9c0a197a0910c73677680746f0fcb5b666e7c1e6cb332f14d7e3ebf5f0ec8eac18b120574164c822369bc62a115a73e8906393c698d248507fb4490313056b329499e92091470ba88ce06e542f6ed527ed6038080e2077355404731e7ad59bd70b4b175c63c2edae7df525138f6f56f19d97da"}]}, 0x574}], 0x4}, 0x0) [ 326.284817][ T26] audit: type=1800 audit(1674060876.040:201): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1169 res=0 errno=0 16:54:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8991, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:36 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:36 executing program 5: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$rds(r0, &(0x7f00000004c0)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000380), 0x4c, &(0x7f0000000440)=[@cswp={0x58, 0x114, 0x7, {{}, &(0x7f00000003c0)=0xfffffffffffffff8, &(0x7f0000000400)}}], 0x58}, 0x0) 16:54:36 executing program 3: ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0xf7f0c) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x1, 0x8000, 0x1ff, 0x7, {{0xa, 0x4, 0x2, 0x6, 0x28, 0x66, 0x0, 0x7f, 0x29, 0x0, @rand_addr=0x64010101, @multicast2, {[@noop, @generic={0x94, 0x11, "4d8834db79c7edacad4277a708de49"}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f0000000180)={'syztnl2\x00', r0, 0x2f, 0x29, 0x9, 0x7fffffff, 0x10, @local, @private2={0xfc, 0x2, '\x00', 0x1}, 0x700, 0x20, 0x1, 0x8}}) r1 = socket$inet6_udplite(0x2, 0x2, 0x88) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl1\x00', r2, 0x4, 0x8, 0xfb, 0x37, 0x20, @remote, @mcast1, 0x700, 0x700, 0x3, 0x8}}) 16:54:36 executing program 2: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x80000, 0x0) [ 326.387699][ T5848] usb usb9: usbfs: process 5848 (syz-executor.0) did not claim interface 0 before use [ 326.415777][ T26] audit: type=1800 audit(1674060876.220:202): pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1169 res=0 errno=0 16:54:36 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:36 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x3, &(0x7f0000001740)=@framed, &(0x7f00000017c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 326.546540][ T26] audit: type=1800 audit(1674060876.400:203): pid=5861 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1164 res=0 errno=0 16:54:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @private1}}) 16:54:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0x148, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@sec_ctx={0xc, 0x8, {0x8}}, @tmpl={0x84, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0xa, @in6=@local, 0x0, 0x4}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x2, @in=@empty}]}]}, 0x148}}, 0x0) 16:54:36 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:36 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'gretap0\x00', 0x0}) [ 326.641369][ T26] audit: type=1800 audit(1674060876.430:204): pid=5862 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=1174 res=0 errno=0 16:54:36 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cpuinfo\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8927, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:36 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x40049409, 0x0) 16:54:36 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0x148, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@sec_ctx={0xc, 0x8, {0x8}}, @tmpl={0x84, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0xa, @in6=@local, 0x0, 0x4}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x2, @in=@empty}]}]}, 0x148}}, 0x0) 16:54:36 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:36 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x2) 16:54:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x4) 16:54:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x0, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14}}}}) 16:54:36 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0x108, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@sec_ctx={0xc, 0x8, {0x8}}, @tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0x108}}, 0x0) 16:54:36 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x2) 16:54:36 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x0, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:36 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0xc0045005, 0x0) 16:54:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x2, @in=@empty}]}]}, 0xfc}}, 0x0) 16:54:37 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:37 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="8502000000007fd1ff8212b91bb186508e"], &(0x7f0000000040)='GPL\x00', 0x5, 0xfd, &(0x7f0000000080)=""/253, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:37 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x2) 16:54:37 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002340), &(0x7f0000002380)='./file0\x00', 0x0, &(0x7f00000023c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}, 0x0, 0x0, 0x0) 16:54:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x0, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:37 executing program 3: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f0000000140)={0x1e, 0x3, 0x0, @host}, 0x10) 16:54:37 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:37 executing program 2: io_uring_setup(0x6fa4, &(0x7f0000000080)={0x0, 0x0, 0x200}) 16:54:37 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41020, 0x0) 16:54:37 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x2) 16:54:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) [ 327.364510][ T5923] fuse: blksize only supported for fuseblk 16:54:37 executing program 5: pselect6(0x40, &(0x7f0000000040)={0x4}, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 16:54:37 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:37 executing program 1: ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000300)=0x2) 16:54:37 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) recvmsg$qrtr(r0, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x38, 0x0) ioctl$sock_qrtr_TIOCINQ(r0, 0x541b, 0x0) 16:54:37 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000), 0x8b30, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f0000000740)={0x0, 0x3, 0x0, &(0x7f00000007c0)=[{}, {}, {}], 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0, 0x0, 0x0}) 16:54:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') read$FUSE(r0, &(0x7f0000002540)={0x2020}, 0x2020) 16:54:37 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:37 executing program 1: ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000300)=0x2) 16:54:37 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x4, &(0x7f0000001740)=@framed={{}, [@call]}, &(0x7f00000017c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001840), 0x10}, 0x80) 16:54:37 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='=', @ANYBLOB=',']) 16:54:37 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:37 executing program 1: ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000300)=0x2) 16:54:37 executing program 0: syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:38 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x6, &(0x7f0000001a40)=@framed={{}, [@generic={0x5}, @alu, @generic]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:38 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x4020940d, 0x0) 16:54:38 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x0, @in=@empty}]}]}, 0xfc}}, 0x0) 16:54:38 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x2) 16:54:38 executing program 0: syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:38 executing program 4: mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:38 executing program 5: bpf$MAP_CREATE(0x17, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:38 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x2) 16:54:38 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:38 executing program 0: syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:38 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x5008, 0x0) 16:54:38 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000140)=""/177, 0xb1) 16:54:38 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000040)=0x1) 16:54:38 executing program 4: openat2(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 16:54:38 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x2) 16:54:38 executing program 2: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB=',ro']) 16:54:38 executing program 4: openat2(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:38 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x5015, 0x0) 16:54:38 executing program 1: openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000300)=0x2) 16:54:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 16:54:38 executing program 3: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$SNDCTL_DSP_RESET(r0, 0x5000, 0x0) 16:54:38 executing program 4: openat2(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:38 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) recvmsg$qrtr(r0, &(0x7f0000003700)={0x0, 0x0, 0x0}, 0x53, 0x0) 16:54:38 executing program 2: socket$inet6_udplite(0x2, 0x2, 0x11) 16:54:38 executing program 1: openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000300)=0x2) 16:54:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) 16:54:39 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0xfffffffffffffffe, 0x0) 16:54:39 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000000300)=[{0x0, 0x108}], 0x1, &(0x7f0000002380)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 16:54:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x0, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:39 executing program 1: openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000300)=0x2) 16:54:39 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x20, 0x1411, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x20}}, 0x0) 16:54:39 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="100000000d140102"], 0x10}}, 0x0) 16:54:39 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x1411, 0x1}, 0x10}}, 0x0) 16:54:39 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x0, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:39 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="500000000c140102000000000000000008"], 0x50}}, 0x0) 16:54:39 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, 0x0) 16:54:39 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000200)=ANY=[@ANYRES16, @ANYRES8=0x0, @ANYBLOB="ec6572b4b10d96103274f97458a93f7dd2aaf615181fb856de5a659e57f51d738430642d44c911184fae1c622aff"]}) 16:54:39 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)=0x1) 16:54:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x0, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) [ 329.430890][ T6043] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.5'. 16:54:39 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 16:54:39 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, 0x0) 16:54:39 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000440)) 16:54:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:39 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x5421, &(0x7f0000001300)=""/4093) 16:54:39 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, 0x0) 16:54:39 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:39 executing program 3: io_uring_setup(0x450, &(0x7f0000000000)={0x0, 0x6af2, 0x8}) 16:54:39 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x8010500c, 0x0) 16:54:39 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045010, 0x0) 16:54:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:39 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)) 16:54:39 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:39 executing program 2: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x6c800, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0) 16:54:39 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) accept$packet(r0, 0x0, 0x0) 16:54:39 executing program 5: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='=', @ANYBLOB=',r']) 16:54:39 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) 16:54:39 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8948, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:39 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)) 16:54:39 executing program 3: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)=@userptr={0x0, 0xa, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1eed3726"}, 0x0, 0x2, {&(0x7f0000000040)}}) 16:54:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0}) [ 330.063984][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 330.064006][ T26] audit: type=1800 audit(1674060879.920:222): pid=6091 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=1178 res=0 errno=0 [ 330.070631][ T6091] fuse: Unknown parameter 'r' [ 330.170506][ T26] audit: type=1800 audit(1674060879.990:223): pid=6094 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1157 res=0 errno=0 16:54:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="2d1484ee4666a4407f131bdf97ab882808247acce67d8fa0a61d8935f8ff55c841c65c646419dc769826e6abb9276409c4"]}) 16:54:40 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:40 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000300)) 16:54:40 executing program 3: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)=@userptr={0x0, 0xa, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1eed3726"}, 0x0, 0x2, {&(0x7f0000000040)}}) 16:54:40 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x5421, 0x0) [ 330.263311][ T6102] usb usb9: usbfs: process 6102 (syz-executor.0) did not claim interface 0 before use 16:54:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:54:40 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f00000032c0)={0x0, 0x0, 0x0}, 0x0) 16:54:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891f, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:40 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) [ 330.368352][ T26] audit: type=1800 audit(1674060880.220:224): pid=6112 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1158 res=0 errno=0 16:54:40 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:40 executing program 5: socketpair(0x11, 0x0, 0x0, &(0x7f00000000c0)) [ 330.473525][ T6115] usb usb9: usbfs: process 6115 (syz-executor.0) did not claim interface 0 before use [ 330.513504][ T26] audit: type=1800 audit(1674060880.370:225): pid=6120 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1177 res=0 errno=0 16:54:40 executing program 3: syz_mount_image$fuse(&(0x7f0000002340), &(0x7f0000002380)='./file0\x00', 0x0, &(0x7f00000023c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/cuse\x00'}}]}}, 0x0, 0x0, 0x0) 16:54:40 executing program 1: openat$damon_attrs(0xffffffffffffff9c, &(0x7f00000001c0), 0x600, 0x0) 16:54:40 executing program 0: io_uring_setup(0x37c6, &(0x7f0000000140)) io_uring_setup(0x2aa3, &(0x7f00000001c0)) 16:54:40 executing program 5: syz_usb_connect(0x3, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x45, 0x26, 0x29, 0x0, 0x50d, 0x2, 0xf350, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x91, 0xce, 0xd2}}]}}]}}, 0x0) 16:54:40 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), 0x0, 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:40 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), 0x0, 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:40 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002340), &(0x7f0000002380)='./file0\x00', 0x0, &(0x7f00000023c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}, 0x0, 0x0, 0x0) [ 330.685244][ T26] audit: type=1800 audit(1674060880.540:226): pid=6134 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1182 res=0 errno=0 [ 330.687705][ T6131] fuse: Bad value for 'fd' [ 330.821963][ T26] audit: type=1800 audit(1674060880.680:227): pid=6138 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1177 res=0 errno=0 [ 330.981696][ T5215] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 331.171358][ T5215] usb 6-1: device descriptor read/64, error 18 16:54:41 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x5460, 0x0) 16:54:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x8, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 16:54:41 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x416, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x80000001, 0x0, &(0x7f0000000400)="f8", 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:54:41 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$netrom(r0, &(0x7f0000002180)={{}, [@remote, @default, @bcast, @bcast, @netrom, @remote, @rose, @rose]}, &(0x7f0000000000)=0x48) 16:54:41 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), 0x0, 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:41 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002480)={0x2020}, 0x2020) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) [ 331.378756][ T26] audit: type=1800 audit(1674060881.230:228): pid=6145 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1174 res=0 errno=0 [ 331.394973][ T6143] usb usb9: usbfs: process 6143 (syz-executor.3) did not claim interface 0 before use [ 331.456704][ T5215] usb 6-1: new high-speed USB device number 3 using dummy_hcd 16:54:41 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:41 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)={0x18, 0x140c, 0x201, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x3}]}, 0x18}}, 0x0) [ 331.492181][ T26] audit: type=1400 audit(1674060881.280:229): avc: denied { create } for pid=6142 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 331.597727][ T26] audit: type=1800 audit(1674060881.440:230): pid=6151 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1169 res=0 errno=0 [ 331.661382][ T5215] usb 6-1: device descriptor read/64, error 18 [ 331.719736][ T6156] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 331.792350][ T5215] usb usb6-port1: attempt power cycle [ 332.211391][ T5215] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 332.311540][ T5215] usb 6-1: Invalid ep0 maxpacket: 0 [ 332.461410][ T5215] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 332.561426][ T5215] usb 6-1: Invalid ep0 maxpacket: 0 [ 332.570737][ T5215] usb usb6-port1: unable to enumerate USB device 16:54:43 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$MRT_DEL_VIF(r0, 0x6b, 0x3, 0x0, 0x0) 16:54:43 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000800)={0x0, 0x2}, 0x20) 16:54:43 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x2b, 0x3, 0x0, {0x0, 0xa, 0x0, 'net/ptype\x00'}}, 0x2b) 16:54:43 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:43 executing program 0: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080), 0x2001, 0x0) 16:54:43 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8994, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:43 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000026c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000006740)={0x2020}, 0x2020) [ 333.735413][ T26] audit: type=1800 audit(1674060883.590:231): pid=6165 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1177 res=0 errno=0 16:54:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000600)='net/llc/socket\x00') 16:54:43 executing program 3: socket$inet6_udplite(0x2, 0x2d, 0x88) 16:54:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="2d1484ee882808247acce67d8fa0a61d8935f8ff55c82d"]}) 16:54:43 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) fcntl$lock(r0, 0x7, 0x0) 16:54:43 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80086601, 0x0) 16:54:43 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0xc) 16:54:43 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xc) getpeername$qrtr(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffef1) 16:54:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8921, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:43 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:44 executing program 0: socket$inet6_udplite(0x2, 0xa, 0x88) 16:54:44 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x40}, 0x18) 16:54:44 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80105013, 0x0) 16:54:44 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'pim6reg\x00'}) 16:54:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x1d}, 0x48) 16:54:44 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="500000000c1401"], 0x50}}, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000071c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000007300)={0x2020}, 0x2020) 16:54:44 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(0xffffffffffffffff, 0x0, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) recvmsg$qrtr(r0, &(0x7f0000003700)={0x0, 0x0, 0x0}, 0x38, 0x0) 16:54:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 16:54:44 executing program 2: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2002461, &(0x7f00000000c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}, 0x0, 0x0, 0x0) [ 334.403481][ T6207] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 16:54:44 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000004240)={0x10}, 0x10}, {&(0x7f0000005d40)={0x10, 0x0, 0x1}, 0x10}], 0x2}, 0x0) 16:54:44 executing program 5: bpf$MAP_CREATE(0xa, &(0x7f0000000040)=@bloom_filter, 0x48) 16:54:44 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) [ 334.554394][ T6215] ======================================================= [ 334.554394][ T6215] WARNING: The mand mount option has been deprecated and [ 334.554394][ T6215] and is ignored by this kernel. Remove the mand [ 334.554394][ T6215] option from the mount to silence this warning. [ 334.554394][ T6215] ======================================================= 16:54:44 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, 0x0, 0x0) 16:54:44 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:44 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0xc0045003, 0x0) 16:54:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/psched\x00') read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) 16:54:44 executing program 5: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05605, &(0x7f0000000040)=0x2) 16:54:44 executing program 0: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$VIDIOC_G_CROP(r0, 0x401c5820, &(0x7f00000002c0)) 16:54:45 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:45 executing program 3: r0 = socket$inet6_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @ipv4={'\x00', '\xff\xff', @private}}}) 16:54:45 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f0000000100)={0x2a, 0x1, 0x7fff}, 0xc) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) 16:54:45 executing program 2: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x50840}, 0x18) read$FUSE(r0, &(0x7f0000002300)={0x2020}, 0x2020) 16:54:45 executing program 0: bpf$MAP_CREATE(0x8, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:45 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x5, 0x709200) 16:54:45 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000003c0)=0x5, 0x4) 16:54:45 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x541b, 0x0) [ 335.362960][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 335.362981][ T26] audit: type=1800 audit(1674060885.220:240): pid=6242 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1157 res=0 errno=0 16:54:45 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f00000003c0), 0x4) 16:54:45 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:45 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="10000000021401"], 0x10}}, 0x0) 16:54:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/udplite\x00') 16:54:45 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="10000000011401"], 0x10}}, 0x0) 16:54:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="2d1484ee4666a4407f131bdf97ab882808"]}) 16:54:45 executing program 0: r0 = socket(0x18, 0x0, 0x0) bind$qrtr(r0, 0x0, 0x0) 16:54:45 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$afs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x26020, &(0x7f0000000240)={[{}]}) 16:54:45 executing program 5: bpf$MAP_CREATE(0xe, &(0x7f0000000180)=@bloom_filter, 0x48) [ 335.564545][ T26] audit: type=1800 audit(1674060885.420:241): pid=6255 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1177 res=0 errno=0 16:54:45 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000005980)=[{&(0x7f0000004240)={0x10}, 0x10}, {&(0x7f0000005d40)={0x10, 0x4027, 0x1}, 0x10}], 0x31}, 0x0) 16:54:45 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x7c243) 16:54:45 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) read$nci(r0, &(0x7f0000000080)=""/169, 0xa9) 16:54:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000006200)={&(0x7f0000000080)=@proc, 0xc, &(0x7f0000006180)=[{&(0x7f0000000200)={0x260, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x245, 0x0, 0x0, 0x1, [@generic="822e3a814fbd456a7e0a384aad335c2c96c198b6a7820833d93c4a0be1ffca211214fe537716c266805aaa7ac1e691fb88c8cc968e1df93e3bf78f7ce5a94d98cf4f3e95a8d4cacdb6ec20921590bb7dd403eac41aa63a053dda413563ac44a55726c379276a6359441dd80d141dd99463c3d005c2cc19e2629cd4fd02bf114520908a02cf059bcaba1c2ce2c568701b021fd2a8a2a56577a837f80bc391406cb7bc78bff275fc49ff12", @generic="8a5e0e07648a1325c020ce52233bb81cf596378c1c73fb353bdf067e6bacbcf685d3ad52ed6ab6b384f5e6231e67ced5cad929e934a77a56c22196", @generic="871a3741d18c1b8947460b00165d62e5e582093372cf81c0e2ddd92ca714fa24c3062e25a5a7a2675071a7533b5fc8b88c700cce702f4f6cac21b08dc6535aba55c086d0ba65c32ec34b98a625af50f8bde076bcd6894ed0b5f2ac598927f88856a8c814ea3b6876fe40995326b14a5a51aafe8ed508c186f8d3f1cbee8b94e4ac121575abcad3421d39d5d0d1b82c6affab2cb89f120314a60b7599d2bacbd8e5917508f80261f531b3909ae918414e3a6765fb3214f4bcceab2f89ed289551f8de0067efd33bb152da638406beb397935655cf911267af7669f23d3f06762ff6e1592344186700bc2e", @generic="abffec159c10bd3791f507871521113d3d0c24c8c1ac0aafaf4f707c775094b4ba33e496c391e968e12e4eb7c09d90188820744d1687f81fb4c3be65140f4e09c0a981621b250aab4be91a1b71f39f5c8e766a2c2452f190a5a3dbf8b4ef602990ca93596b54", @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x7ffff000}, {&(0x7f0000000480)={0x1ec, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x4}, @nested={0xf1, 0x0, 0x0, 0x1, [@generic="0ed74740f79e067e5d51d638d363ca22e2d035feb9d675e534c7c769cab4a522a5be1597b4d8bc3ebcc92497c1abb130e93355e36d714283d4a0dcdb7331b6f39f43d5a36ad0c1c9a16683d7e1b17d0d2cc057649ea92d7b99ba743518e7590218c26b280f63f1739a94c7e8701f20229ff0cc6c427478e16ce33cc3d99043acbf853c27bef4a1f316cc756c6677e7eed25d98b59fcd9f66dac37af6443ff6fe7cdbc44c1e32bbd685356e7b52ad91ac265648775a365593064635d8c675a08c6485a3ecc7a732a63c0f06afd4b228f02b1a3980c65b6d0fc1639ae976", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @typed={0x8, 0x0, 0x0, 0x0, @u32}]}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="c05bab15ddca1ace709258b5eead8c0f75f58f966dd76acffc36698a79e7dc558f6cb5c004a7beeba1a4cbd41e605cb3b9a7d2114916783f40b5143249d9b668c14fc62df6e8c0f1ecfd1c7beac6767a58485e7cc674f0b3b2587ce2ab66b62073596bbabbe967f1d8ec3ce3ecca4d5bc1cb61810387a5266353a03db5efb1a417d09ebe06eb01ad2c2b34c995824f8a40685211163e7a150785972f1bd4e6ab8e66a926dcfd98ab19486251dcb780affcb98711efd7329c7604539c374e0c6b50d904169a5805e31cfd4ffb02883f3133"]}, 0x1ec}, {&(0x7f0000000680)={0xa78, 0x0, 0x0, 0x0, 0x0, "", [@generic="e2be2983fbbd3b2bd5f831380e858d7d8e8b09ea7169eee5ff96fb71c1ba00a28e39b912e9e9e9dd3bd89dbb7ca9ffaa38dcd00c4e7e9bb120", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@loopback}, @nested={0xa24, 0x0, 0x0, 0x1, [@typed={0xa1d, 0x0, 0x0, 0x0, @binary="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"}]}]}, 0xa78}], 0x3}, 0x0) [ 335.699008][ T26] audit: type=1400 audit(1674060885.500:242): avc: denied { bind } for pid=6259 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 335.709830][ T6267] devtmpfs: Unknown parameter 'autocell' [ 335.809452][ T26] audit: type=1800 audit(1674060885.550:243): pid=6267 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1182 res=0 errno=0 16:54:45 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:45 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0x2}, 0xc) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 16:54:45 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xe8, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}}, [@replay_esn_val={0x1c}, @tfcpad={0x8}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0xe8}}, 0x0) 16:54:45 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$can_j1939(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x84054) 16:54:45 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x140c, 0x1}, 0x10}}, 0x0) 16:54:45 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05605, &(0x7f0000000300)=0xe) 16:54:45 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002480)={0x28, 0x6}, 0x28) 16:54:45 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xc) getpeername$qrtr(r0, 0x0, 0x0) 16:54:45 executing program 1: r0 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000002140), &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1d, r0, r2, r1, 0x0) 16:54:45 executing program 0: bpf$MAP_CREATE(0x13, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8923, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="2d1484ee4666a4407f131bdf97ab882808247acce67d8fa0a61d8935f8ff55c841c65c646419dc769826e6abb9276409c4"]}) [ 336.075887][ T26] audit: type=1800 audit(1674060885.930:244): pid=6287 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1158 res=0 errno=0 16:54:46 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0xe) [ 336.184262][ T6300] : renamed from tunl0 (while UP) 16:54:46 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x582a, 0x0) 16:54:46 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000040), 0xfffffffffffffd5d) 16:54:46 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080)=0xfffffffa, 0x4) 16:54:46 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x5450, 0x0) 16:54:46 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0xc0045009, 0x0) 16:54:46 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0xe) 16:54:46 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x20481) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x0, 0x0, &(0x7f0000000400)="f8", 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:54:46 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCGETSGCNT(r0, 0x80108906, 0x0) 16:54:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bb1}}, 0xb8}}, 0x0) [ 336.425053][ T26] audit: type=1400 audit(1674060886.280:245): avc: denied { setopt } for pid=6304 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 16:54:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$FUSE_STATFS(r0, 0x0, 0x0) 16:54:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="2d1484ee4666a4407f131bdf97ab882808247acce67d8fa0a61d8935f8ff55c841c65c646419dc769826e6abb9"]}) 16:54:46 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) pselect6(0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x9}, &(0x7f0000000400)={0x0, 0x3938700}, 0x0) [ 336.541542][ T26] audit: type=1800 audit(1674060886.370:246): pid=6315 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1161 res=0 errno=0 [ 336.599830][ T6321] usb usb9: usbfs: process 6321 (syz-executor.2) did not claim interface 0 before use [ 336.618470][ T6324] Zero length message leads to an empty skb 16:54:46 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x582a, 0x0) 16:54:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') getpeername$packet(r0, 0x0, 0x0) 16:54:46 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x5452, 0x0) 16:54:46 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004440)={0x2020}, 0x2020) read$nci(r0, &(0x7f0000000140)=""/177, 0xb1) 16:54:46 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) 16:54:46 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) 16:54:46 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000140)=""/177, 0xb1) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) [ 336.880183][ T26] audit: type=1800 audit(1674060886.730:247): pid=6337 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=1177 res=0 errno=0 16:54:46 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1000000000002f"], 0x28}}, 0x0) 16:54:46 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$nci(r0, &(0x7f0000000380)=""/103, 0x67) 16:54:46 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x582a, 0x0) [ 336.981178][ T26] audit: type=1800 audit(1674060886.770:248): pid=6340 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1155 res=0 errno=0 [ 337.105276][ T26] audit: type=1800 audit(1674060886.870:249): pid=6343 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=1167 res=0 errno=0 16:54:47 executing program 5: syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000001, 0x29032, 0xffffffffffffffff, 0x10000000) 16:54:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000016c0)={0x6, 0x4, &(0x7f0000001a40)=@framed={{}, [@alu]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:47 executing program 0: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000200)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfsfloor}]}}, 0x0, 0x0, 0x0) 16:54:47 executing program 3: bpf$MAP_CREATE(0x2, &(0x7f0000000040)=@bloom_filter, 0x2d) 16:54:47 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x582a, 0x0) 16:54:47 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000180), 0x4) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0x2}, 0xc) [ 337.256642][ T6357] fuse: Bad value for 'fd' 16:54:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x109112, r0, 0x0) 16:54:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000200)=ANY=[]}) 16:54:47 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 16:54:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:47 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0xc004500a, 0x0) 16:54:47 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0xffff7ffc}, 0xc) 16:54:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0xe, 0x0, &(0x7f0000000040)) 16:54:47 executing program 3: openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x20}, 0x18) 16:54:47 executing program 2: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40000, &(0x7f00000000c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 16:54:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mprotect(&(0x7f0000837000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000835000/0x3000)=nil, 0x3000) 16:54:47 executing program 5: r0 = socket(0x18, 0x0, 0x1) getsockopt$bt_BT_POWER(r0, 0x112, 0x4, 0x0, 0x0) 16:54:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0x13c, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x84, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0xa, @in6=@local, 0x0, 0x4}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x0, @in=@empty}]}]}, 0x13c}}, 0x0) 16:54:47 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002480)={0x28}, 0x28) 16:54:47 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05605, &(0x7f0000000300)=0x5) 16:54:47 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 16:54:47 executing program 5: bpf$MAP_CREATE(0x1c, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:47 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$can_j1939(r0, &(0x7f0000000100)={&(0x7f0000000040), 0x18, &(0x7f00000000c0)={0x0}}, 0x24000850) 16:54:47 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCGETSGCNT(r0, 0x8907, 0x0) 16:54:47 executing program 1: io_uring_setup(0x450, &(0x7f0000000000)={0x0, 0x0, 0x8}) 16:54:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xe, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002480)={0x2020}, 0x2020) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:47 executing program 5: socket$inet6_udplite(0x2, 0x2, 0x106) 16:54:47 executing program 2: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1b8000, &(0x7f0000000080)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 16:54:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8920, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:47 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_qrtr_TIOCINQ(r0, 0x541b, &(0x7f00000013c0)) 16:54:47 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002480)={0x2020}, 0x2020) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:48 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x41025, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 16:54:48 executing program 1: syz_open_procfs(0x0, &(0x7f0000006300)='attr/exec\x00') 16:54:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xe8, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}}, [@replay_esn_val={0x1c}, @tfcpad={0x8}, @sec_ctx={0xc, 0x8, {0x8}}]}, 0xe8}}, 0x0) 16:54:48 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x40045017, 0x0) 16:54:48 executing program 1: openat2(0xffffffffffffff9c, &(0x7f00000001c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000000c0)={0x44240}, 0x18) 16:54:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x401c5820, &(0x7f0000001300)=""/4093) 16:54:48 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xc4, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xc4}}, 0x0) 16:54:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x12, 0x1, 0x0, 0x7d8}, 0x48) 16:54:48 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1}, 0xc) connect$qrtr(r0, &(0x7f0000000000), 0xc) 16:54:48 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/cpuinfo\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}}) 16:54:48 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r2, &(0x7f0000000040)={0x1d, r1}, 0x18) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r1}, 0x18) 16:54:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:48 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/slabinfo\x00', 0x0, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000140), 0x83) 16:54:48 executing program 1: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$afs(&(0x7f0000000040)=@cell={0x25, '', 'syz0', '.backup'}, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0) 16:54:48 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000000300), 0x4) 16:54:48 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x29032, 0xffffffffffffffff, 0x10000000) 16:54:48 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="10000000111443fb"], 0x10}}, 0x0) 16:54:48 executing program 0: r0 = socket$inet6_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) 16:54:48 executing program 4: syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='fdinfo/4\x00') 16:54:48 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000140)={0x0, 0x0, 0xfffffffffffffffe}, 0x0) 16:54:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8937, &(0x7f0000000080)={'tunl0\x00', 0x0}) [ 338.766812][ T6451] kAFS: No cell specified 16:54:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0x108, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@sec_ctx={0xc, 0x8, {0x8}}, @tmpl={0x44, 0x5, [{{@in=@loopback}, 0xa, @in6=@local, 0x0, 0x4}]}]}, 0x108}}, 0x0) 16:54:48 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045007, 0x0) 16:54:48 executing program 4: openat$audio1(0xffffffffffffff9c, &(0x7f0000000000), 0x43, 0x0) 16:54:48 executing program 0: r0 = socket(0x18, 0x0, 0x0) accept4$nfc_llcp(r0, 0x0, 0x0, 0x0) 16:54:48 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0x5) 16:54:48 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000040), 0x2) write$qrtrtun(r0, &(0x7f00000001c0)='2', 0x1) 16:54:48 executing program 5: socket$inet6_udplite(0xa, 0x3, 0x88) 16:54:48 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x0, 0x1000, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x40000, 0x0) 16:54:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000040)=""/177, 0x7ffff000) 16:54:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[], 0x98}, 0x0) 16:54:48 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/crypto\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:48 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e7, 0x0) 16:54:48 executing program 5: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x2, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) 16:54:48 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) 16:54:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89b1, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:49 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0xf, 0x0, &(0x7f0000000040)) 16:54:49 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmstat\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:49 executing program 5: r0 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r1) 16:54:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr=0x64010101}}}}) 16:54:49 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002340), &(0x7f0000002380)='./file0\x00', 0x0, &(0x7f00000023c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@uid_gt}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/cuse\x00'}}]}}, 0x0, 0x0, 0x0) 16:54:49 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80105014, 0x0) 16:54:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="ff"], 0x14}}, 0x0) 16:54:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)) [ 339.377334][ T6500] fuse: Unknown parameter 'uid>00000000000000000000' 16:54:49 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$MRT_DEL_VIF(r0, 0x6b, 0x4, 0x0, 0x0) 16:54:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:49 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0xb) 16:54:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, 0x0) 16:54:49 executing program 3: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x2}) 16:54:49 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$can_j1939(r0, &(0x7f0000000040), 0x18) 16:54:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:49 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045006, 0x0) 16:54:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:49 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)={0x18, 0x140c, 0x201, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 16:54:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_score\x00') read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 16:54:49 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002480)={0x2020}, 0x2020) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:49 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) 16:54:49 executing program 2: r0 = socket(0x22, 0x2, 0x2) setsockopt$MRT6_PIM(r0, 0x29, 0xcf, 0x0, 0x0) 16:54:49 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000540)={0x1d, r2, 0x0, {0x0, 0x0, 0x4}}, 0x18) 16:54:49 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="260000000300000000000000000000000005000000000000002c"], 0x26) 16:54:49 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$MRT_DEL_VIF(r0, 0x6b, 0x2, 0x0, 0x0) 16:54:49 executing program 4: readv(0xffffffffffffff9c, &(0x7f0000000140), 0x5) 16:54:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f00000027c0)=ANY=[@ANYBLOB="4c000000110001"], 0x4c}}, 0x0) 16:54:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8992, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002280), 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x1f) 16:54:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x15, 0x8, 0x3}, 0x48) 16:54:49 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000540)={0x2}, 0x18) 16:54:49 executing program 5: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) [ 340.050162][ T6553] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 16:54:49 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$netlink(r0, &(0x7f0000006400)={&(0x7f0000002200), 0xc, &(0x7f0000004300)=[{&(0x7f0000002240)={0x10}, 0x10}, {&(0x7f0000003700)=ANY=[@ANYBLOB="ac5bcc9165ae47eff61cdbddba2b1175d20cfbe2ffa718e3469f0bd7f0a99a0e8a6576dbdd728553e1316db73dbb354822a5b46200a93e186f63aa36a809ad35ca2cf88562852ab2e8fe43147383db2fe956993297b8d5c8d8a0926486baaea6d002520948f6e339216887734dcf13eed0c6bbca3eef8f1e1a4cd09360b2ad97e9a9d76edd7f3c1e8b3b740a021297e9ce483f869d86a08bd5070000000000000082e9e8685231537e8fce1c"], 0x10}], 0x2, &(0x7f00000063c0)=[@cred={{0x1c}}], 0x7}, 0x0) 16:54:50 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f00000032c0)={0x0, 0x0, &(0x7f00000031c0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x12142) 16:54:50 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x5451, 0x0) 16:54:50 executing program 1: socketpair(0x1e, 0x0, 0x4, &(0x7f0000000040)) 16:54:50 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80044df9, 0x0) 16:54:50 executing program 0: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05605, &(0x7f0000000300)=0xd) 16:54:50 executing program 5: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:50 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:50 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002280)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004440)={0x2020}, 0x2020) 16:54:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000000)={'sit0\x00', 0x0}) 16:54:50 executing program 2: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000002440), 0x0, 0x0) connect$qrtr(r0, &(0x7f00000000c0), 0xfef5) 16:54:50 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002340), &(0x7f0000002380)='./file0\x00', 0x0, &(0x7f00000023c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/cuse\x00'}}]}}, 0x0, 0x0, 0x0) 16:54:50 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002480)={0x28, 0x5}, 0x28) 16:54:50 executing program 5: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x140b, 0x1}, 0x10}}, 0x0) 16:54:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000006300)='net/ptype\x00') read$FUSE(r0, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002580), 0x2, 0x0) write$FUSE_ENTRY(r2, &(0x7f00000025c0)={0x90, 0x0, r1}, 0x90) 16:54:50 executing program 3: bpf$MAP_CREATE(0xd, &(0x7f0000000180)=@bloom_filter, 0x48) [ 340.507541][ T6593] fuse: Unknown parameter 'smackfstransmute' 16:54:50 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:50 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000800)={0x88}, 0x20) 16:54:50 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000180)=0x5, 0x4) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0x2}, 0xc) [ 340.600672][ T26] kauditd_printk_skb: 12 callbacks suppressed [ 340.600704][ T26] audit: type=1400 audit(1674060890.450:262): avc: denied { create } for pid=6595 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 340.602585][ T6597] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5131 sclass=netlink_tcpdiag_socket pid=6597 comm=syz-executor.1 16:54:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) write$FUSE_STATFS(r0, &(0x7f0000002480)={0x60}, 0x60) [ 340.622210][ T26] audit: type=1400 audit(1674060890.460:263): avc: denied { write } for pid=6595 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 16:54:50 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:50 executing program 3: bpf$MAP_CREATE(0x7, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:50 executing program 4: syz_mount_image$fuse(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2060804, &(0x7f0000002340), 0x0, 0x0, 0x0) 16:54:50 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) read$nci(r0, &(0x7f0000002180)=""/207, 0xcf) 16:54:50 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000140)=""/177, 0xb1) read$nci(r0, &(0x7f0000000000)=""/13, 0xd) [ 340.817653][ T26] audit: type=1800 audit(1674060890.580:264): pid=6606 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=1162 res=0 errno=0 [ 340.825755][ T6611] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6611 comm=syz-executor.2 16:54:50 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:50 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045003, 0x0) 16:54:50 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) 16:54:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x894a, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:50 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$MRT_DEL_VIF(r0, 0x6b, 0x4, 0x0, 0x4) 16:54:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:54:50 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r2}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000540)={0x1d, r3}, 0x18) 16:54:50 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={0x0}}, 0x0) 16:54:50 executing program 2: bpf$MAP_CREATE(0x600, 0x0, 0x0) 16:54:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8970, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:51 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) read$nci(r0, &(0x7f00000023c0)=""/174, 0xae) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x78) 16:54:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:54:51 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xc) getpeername$qrtr(r0, 0x0, &(0x7f0000000080)) [ 341.182578][ T26] audit: type=1400 audit(1674060891.040:265): avc: denied { write } for pid=6634 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 16:54:51 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="100000000d1401"], 0x10}}, 0x0) 16:54:51 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="85"], &(0x7f0000000040)='GPL\x00', 0x5, 0xfd, &(0x7f0000000080)=""/253, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:54:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 16:54:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 16:54:51 executing program 0: bpf$MAP_CREATE(0x9, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:51 executing program 1: r0 = socket(0x2a, 0x2, 0x0) accept$nfc_llcp(r0, 0x0, 0x0) 16:54:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x2, &(0x7f0000001300)=""/4093) 16:54:51 executing program 2: bpf$MAP_CREATE(0x21, &(0x7f0000000180)=@bloom_filter, 0x48) 16:54:51 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0x3, 0x7c243) 16:54:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 341.479625][ T26] audit: type=1400 audit(1674060891.330:266): avc: denied { accept } for pid=6657 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 16:54:51 executing program 0: syz_usb_connect$printer(0x5, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0xe0, 0x6, [{{0x9, 0x4, 0x0, 0x70, 0x2, 0x7, 0x1, 0x2, 0x1, "", {{{0x9, 0x5, 0x1, 0x2, 0x40, 0x1, 0x8, 0x4}}}}}]}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x6, [{0x33, &(0x7f0000000100)=ANY=[@ANYBLOB="330300000000000000ff04e3fcd6100d8fd4fe8c1d03bed15c03247c48e18febeb54f7c06565001b5257d799555d79"]}, {0x78, &(0x7f0000000140)=@string={0x78, 0x3, "791b0e662eab7a00cc10d93224ba41fc32523712ea470b772f331e0f029ed18df792aa634ea1d210eb6767693d78ca3ccdf1f794c827f2d2dff2b8f58645c63e9fad03c93290bcfe5c0686d2949256dc55cec6ca48e476dc4b67ece2dfb5b4219302cd2cb6b57141f43f4e7573229626788a2fdef3a3"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x2009}}, {0x43, &(0x7f0000000240)=@string={0x43, 0x3, "151263c931a90f975198c6d61d2deceabd48c44a6fcbfbb92acf42da6e51f366be02da0409d9e1763c37fdc9fa64b4279d583193ef46e4f1541749098b3dd3a7fa"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0xc04}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x180c}}]}) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f00000003c0)=0x5, 0x4) 16:54:51 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {}, 0x1, 0x0, 0x0, 0x3}}, 0x26) 16:54:51 executing program 2: r0 = socket(0x18, 0x0, 0x2) bind$qrtr(r0, 0x0, 0x0) 16:54:51 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$nci(r0, &(0x7f0000000040)=""/177, 0xb1) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:54:51 executing program 4: openat2(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', &(0x7f0000000180), 0x18) 16:54:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 16:54:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8911, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8931, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:51 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x4, 0x0, &(0x7f0000000040)) 16:54:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/psched\x00') read$FUSE(r0, 0x0, 0x0) 16:54:51 executing program 2: syz_open_procfs(0x0, &(0x7f0000001900)='comm\x00') 16:54:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 341.881383][ T5215] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 342.264163][ T5215] usb 1-1: config 1 interface 0 altsetting 112 bulk endpoint 0x1 has invalid maxpacket 64 [ 342.285986][ T5215] usb 1-1: config 1 interface 0 altsetting 112 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 342.311925][ T5215] usb 1-1: config 1 interface 0 has no altsetting 0 [ 342.471724][ T5215] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 342.480874][ T5215] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 342.551069][ T5215] usb 1-1: Product:   [ 342.566035][ T5215] usb 1-1: Manufacturer: ᭹明ꬮz჌㋙먤ﱁ刲ሷ䟪看㌯༞鸂跑鋷措ꅎგ柫楧砽㳊铷⟈틲䖆㻆궟줃進ﺼٜ튆銔칕쫆杋뗟↴ʓⳍ떶䅱㿴畎≳⚖詸ꏳ [ 342.627942][ T5215] usb 1-1: SerialNumber: ሕ쥣ꤱ霏顑훆ⴝ䢽䫄쭯맻켪兮曳ʾӚ盡㜼짽擺➴墝錱䛯᝔ॉ㶋ꟓ [ 342.662105][ T6670] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 342.930272][ T5215] usb 1-1: USB disconnect, device number 3 16:54:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5421, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:53 executing program 1: io_uring_setup(0x1576, &(0x7f00000000c0)={0x0, 0x0, 0x4}) 16:54:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891e, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:53 executing program 3: r0 = socket(0x2a, 0x2, 0x0) connect$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "59e5fabd61dc36658163914c874b5237e351fc75ab29a0d6c8f00b07f32eb522789f8e13c9aff2991614d2de4d75b41bdd2ed8cb22d309e91821abcda9c053"}, 0x60) 16:54:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:54:53 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') read$FUSE(r0, &(0x7f0000002540)={0x2020}, 0x2020) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) 16:54:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8993, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1004, 0x1}, 0x48) 16:54:53 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000002480)={0x28, 0x2}, 0x28) 16:54:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:54:53 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='ns\x00') 16:54:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x400445a0, &(0x7f0000001300)=""/4093) 16:54:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891d, &(0x7f0000000080)={'tunl0\x00', 0x0}) 16:54:53 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000000)=ANY=[@ANYBLOB="500000000c1401"], 0x50}}, 0x0) 16:54:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000280)=ANY=[]}) 16:54:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:54:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004440)={0x2020}, 0x2020) 16:54:53 executing program 1: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0xc0d05640, &(0x7f0000000300)=0xd) 16:54:53 executing program 0: openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x44240}, 0x18) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x5c00, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x104000, 0x0) [ 343.748047][ T6721] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 16:54:53 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xc) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0xffff7ffc}, 0xc) 16:54:53 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004440)={0x2020}, 0x2020) 16:54:53 executing program 3: getresuid(&(0x7f0000000140), &(0x7f0000000180), 0xfffffffffffffffe) 16:54:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x0, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) [ 343.875581][ T26] audit: type=1800 audit(1674060893.730:267): pid=6732 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=1155 res=0 errno=0 16:54:53 executing program 3: semctl$GETNCNT(0xffffffffffffffff, 0x0, 0x3, 0x0) 16:54:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1, 0x2, 0x0) 16:54:53 executing program 4: r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)={0x80040}, 0x18) read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) 16:54:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x0, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:53 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan0\x00'}) 16:54:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x80104592, &(0x7f0000001300)=""/4093) 16:54:53 executing program 3: recvmsg$qrtr(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000059c0)=[{0x1010, 0x0, 0x0, ""/4096}, {0x1018, 0x0, 0x0, ""/4096}, {0x88, 0x0, 0x0, ""/118}, {0x58, 0x0, 0x0, ""/66}, {0x18, 0x0, 0x0, ""/8}, {0x38, 0x0, 0x0, ""/37}, {0x98, 0x0, 0x0, ""/129}, {0x70, 0x0, 0x0, ""/95}], 0x2260}, 0xfffffffffffffe8b, 0x0) 16:54:53 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000400), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, 0x0) 16:54:54 executing program 4: clock_gettime(0x0, &(0x7f0000000640)) 16:54:54 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x0, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) [ 344.136933][ T26] audit: type=1400 audit(1674060893.990:268): avc: denied { ioctl } for pid=6750 comm="syz-executor.2" path="socket:[38449]" dev="sockfs" ino=38449 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 16:54:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x2000810, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='sysfs\x00', 0x800010, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.\x00', 0x0, 0x33080, 0x0) mount(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x20000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.\x00', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2000006a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xaa, 0x0) 16:54:54 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 16:54:54 executing program 4: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000f46f2940cf12117111440000000109021b000100001200090400000103000000090584ef"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001600)={0x84, &(0x7f0000001180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 16:54:54 executing program 0: openat$dsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)}, 0x10) connect$can_j1939(r0, &(0x7f0000000340), 0x18) [ 344.279233][ T26] audit: type=1400 audit(1674060894.130:269): avc: denied { setopt } for pid=6760 comm="syz-executor.2" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 16:54:54 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) [ 344.373017][ T26] audit: type=1400 audit(1674060894.180:270): avc: denied { bind } for pid=6760 comm="syz-executor.2" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 16:54:54 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000a40), 0x0, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000001240)) 16:54:54 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000a40), 0x29, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r0, 0xc0347c03, &(0x7f0000001240)) [ 344.446867][ T26] audit: type=1400 audit(1674060894.180:271): avc: denied { node_bind } for pid=6760 comm="syz-executor.2" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 16:54:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') open(&(0x7f0000001980)='./file0\x00', 0x0, 0x0) 16:54:54 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xfc, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast}}, [@tmpl={0x44, 0x5, [{{@in=@loopback, 0x0, 0x2b}, 0x0, @in6=@local, 0x0, 0x4}]}]}, 0xfc}}, 0x0) 16:54:54 executing program 3: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, 0x0}) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f00000001c0)) 16:54:54 executing program 1: syz_open_dev$media(&(0x7f0000000a40), 0x0, 0x40000) [ 344.694209][ T899] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 345.116578][ T899] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 345.166096][ T899] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 345.177388][ T899] usb 5-1: New USB device found, idVendor=12cf, idProduct=7111, bcdDevice=44.11 [ 345.188143][ T899] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 345.236763][ T899] usb 5-1: config 0 descriptor?? [ 345.521520][ T899] radio-si470x 5-1:0.0: DeviceID=0x0000 ChipID=0x0000 [ 345.528367][ T899] radio-si470x 5-1:0.0: This driver is known to work with firmware version 12, but the device has firmware version 0. [ 345.731481][ T899] radio-si470x 5-1:0.0: software version 0, hardware version 0 [ 345.739110][ T899] radio-si470x 5-1:0.0: This driver is known to work with hardware version 1, but the device has hardware version 0. [ 345.752171][ T899] radio-si470x 5-1:0.0: If you have some trouble using this driver, please report to V4L ML at linux-media@vger.kernel.org [ 345.951545][ T899] radio-si470x 5-1:0.0: submitting int urb failed (-90) [ 346.601684][ T899] radio-si470x 5-1:0.0: si470x_set_report: usb_control_msg returned -71 [ 346.615469][ T899] radio-si470x: probe of 5-1:0.0 failed with error -22 [ 346.640684][ T899] usb 5-1: USB disconnect, device number 2 16:54:56 executing program 4: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000f46f2940cf12117111440000000109021b000100001200090400000103000000090584ef"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001600)={0x84, &(0x7f0000001180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 16:54:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 16:54:56 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:56 executing program 0: ioctl$SNDCTL_DSP_GETODELAY(0xffffffffffffffff, 0x80045017, &(0x7f0000000140)) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f00000001c0)) write$dsp(0xffffffffffffffff, &(0x7f0000000240)="11d9aaa351ee1bcb3781110004034a0aa11e94598b24fccc2b637c3b149d2708c66c572fd18d19f7e5", 0x29) r1 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)}, 0x10) connect$can_j1939(r1, 0x0, 0x0) openat$vmci(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) 16:54:56 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000080)={@link_local, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback=0xac141424}, "00186371ae9b1c03"}}}}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write(r0, &(0x7f0000004400)="d4c65f0c7bbebdb8702538ba76ee70389977d651287ea2663ac5bc5a8d5b5bb4a325474330fee7f49e276fe4e90188ceef0a173adf3ec5d6a543f7a2de5550ba77b4ab18b7a8ae43ddf73a09d06f6dfd3f99056bd37bcabae7f9c13bc4fa28445a90c31614687d3184a8a6d7f38c1892a60dd30341e3527c74693347eaf238281492c8638b4a3f7c616b185e9d8c1c0b681a26f6f6d1b772813237b77c9af159505e1ff6ebe79559ae0efc59cb4e442ea3d9f0277dc7dd5228b1902c14b890cab08e2fe68a0a3dfed118a6de9643ed2e0b14fdebb1cf0f0eb32fa7d4ebed3a122f22b000276e3e01270b9eee007080badf84b8aba8a3dbcbc2a34aba74fd08521a7aba804ef1d9ee48a352d26b84775ac8fc4e585e12debc3d1ce33650d6c06579b522bb03ab0484cfc34c5e30648b8dc67ed40d5ffc265303f8083b911f9b7b353604dbe8997902088876574f6bf652c8a3fd7ac7426b358e33e6bda0a9f6710ee5006613ba2f295cd93561eeae30bf27b714b843568ccb3a600b907eeefeefcafea2cdb3fda757317d8d62d921c29d2b8e9540550664b13e680359a6451065f0874b2f527f2ef388dc83e8adf1234e5b1afb92c5aa9d94848b2863601d0feb87beeab5a23ed9e20b5d0f97f8ea057f01b1616b62f281ec8bfbfb56aadc042ff5bfdbb1914e6d01c6921f8585874260496909b3cb0e98d80566720e747ca33b3ef5b7673740b5c52fbf3055f74979eecd2d1734d24b6d4fae549fa261b299b05688bb9d669acdcef742ce1bc151ec7c9a3c91fc632665f7ab40e3a65d026c5c53240347a7c96e3b490aedec9bc53d1ea8204efc64dd3a2be44446049f56cbca1928af793885fbdc5ac6ed5dac10e28fe8e43629e5b52069ee1933c3bd4962d3e46efa45b62b4b2bf3aa45f49106bceefae138810b79d44c9a291f6bb829dc3a51d6a74de9034942a87971d3c8134350fff6f31faa1c3a15ed4a1747e3d6357ede1f300ffa42db213c2a631bf079afb5f85bc22b98f5bb4d4b3fa4f98a31121a12c915edb5a26fe357a35a99e2c7e86d4a1cb5d18249c1ef34fd4a9b2076e193be685ff59a606846e702bf3d5cb8ab46152e1c352f1493de76bfec450d8713297cfc13a13e104a3f68543235e54fe1a4c554746d6d75a980fe9f17b909fc631c9e4a3cb96aa1288d024a2ee317ddbc4be00bd0abeb829530de94c462eaa417589862a09ced3dcc83ce3717b18817b093c767810e8c174138f83dfd3d346c765b450b9f3ad4ea39ef2c3b77632748d72952b97b5941dc7e4f23fbe6d6132d82f224febd211a857bdcd411806fd7ae7ca5dd4f516f905538d7758f36117dbf845135ff5d06dad94597ef23ab06f513955c35f3d77466870e168248bbe109ef697ab49b287529404deccad9a17d1b4dcf3da8a80a6af31a53ad4b5bfc00def32cd9f5964b0851b03c49cbb7e6f88c44c43cadbafb249f37f4ecd20f661f5b6ba4330500e4bf7308f69e3b8557e42f130715dbde687694c0fcd53b64abdd12ea7ed663a00606bcda776f131d259c414b5dac86a8fd07c8037a2ef37558a25fba19fa41977307eca047c4f00fe9bcab6392e585b09673e85b8d7ad86ed9796422c7071c8205e7a859e6387ac759bf8f21e91098d708036139e2e52f10e2d46594a42a4d55012323af17c85910e8819c504b2a1272fb21ff55b05f211b151fc5a27995cd8dc98af48b31939e63ede2225f4f6d366c2843bbfa4334b022e6685058e77acb30388da0b2b202c0c73c4ce8c5dd635ced1d33eefe8de816e9455aa7f788211450f5f36e3d5cfb26bd2ec51322432bcfe8b5f6258cc62993e3ffcacec2c2a35cdecaf5677a583116352a56990b219d8ec72c7db52f5642dddf7fe216422d19def0cb1e1804a3547995fd8da4fa58c9f21972894f7dcaab6d5db9461222df1b15e69d986730496131b2b3b45b0b012f285dcca21b7f7ebe84dc54f743bf8d0ee29951d583329bf6ce0ba4bfc845c78d5c90f0725d51dae4d8918162bbf33e885bd49073a58ac6e4305df3f9b221e085361d01eca6b9e0f65c1d73d226b3a8e38db30fe85fcbd97f9739cd9e37763540fd4f9b55a135c42ad19ba0214f98bb9479d5a6fc2df5ea707028850eb127813933478979691e01d5fda69d507a6ab701621a0f37b96adb62fa96591d08249d657066bf8549a714d28a5dcfab849873792a2dee8fd06b23b54d3fe9f5de641ff8973353307d7691da79d11633450286d539b63d55be021c201b7f5c9a2fe57fd6c2e85bbf396bb1efaf7595dc81d0d34d5f3e22c33a8bc795635355468ad75f8dd5100b3dcf5b1c1b7097d20e20003e07300d1c40ab111eba44dcc1830a4bd468ec4b10e6968008d65b7ae8b6aa471c2b2d6396ad4dd4c0ee02fd2ec2ae189fc43158dc58761fb8ba5a880053b4cc1b211ca925ed8ded7ed00546da1e36b8992e932426f844ed45b1ed70b231c0ff7d51c3033644ae876e3ef12a5a304339a9536b81d8083610db1a8052fdeba35651ce8f346bad2981e75ae6e62839a1c595ca745d3c0e8d69cafd7e0fb61ebf81b96af33af0b4117b3ab2357740f10bd306a9e65370aa8a13a0d4d834a7394dc5deea28cfc0f3e22f7851a1b61efef92366e2c356ea2b544ceb320a61d90392b7069426b7dcc9fc9667d8acde3ba9fec5fca3351534484f01b55a78621d24084d7bbb6ba00672b8288c33509bee6b1a419dccce5c8ad2700153fb99c3bed7c53865b258b86928ea3ad5816c59078db102100f459fece52b17802d4bbb4441e58e34b5aacef14488bf80ea6c0d3d5b5eb6fc447ee94c406c0cac02ac593d1eddc3c77bc8e5f9aa2bdfe414bc91307b77888cdae2b3759395896c47d0738d162381c20428fbf47d92fdf50b78744cb00c83db88ec902111660978447859b84eed4aa9227d84469cda66e961364baded94f5c1b7b98e9092e9d5a50b4ed699908ac7687f7f8d509e9f748310fc5d425960cefe1232b2492a12e30576f83f079969b124c8fcd28ea3962faee5c9637ee2282f1d77fbe63d25711168f1357c89bf42723e26d023a404b372b7029a6157fb89274512efbed083e94903060467cf346ea017d6830bb248d48c226f7bf65eeebc450e279bb478a2949c2a84f70235895e844f6f4d67632771f2ace481a102ce19451b0ac6b50bc1a0a5dbf1813f1c5d5c9dbd2c529b2af8528ac6f0df6ddd4869b22bb4c7d8cc902b33b53f8ea548dac293b3b93e7861c36856776e45ff353c2fc345f35d05546a9d4bb84f9478c7017d28a4f831117eaefee4d97e8a5278ee0787793d46a47c8a892018d6d2e97d6eec124785bbf0d33f1a58149736a806dcc9331ad300589586ae7b8e0463fa48e6afb29d8e479d5f72acf93eec5c2079a85ffe7b992639e11b0d602c2df580823e64e29a11b2ec9a4ea1abc49e69756e9593481c257a40ce2f1753468f36429ba5c167126ee2afb2b3b3619aa5bc2366c857d482da2c6d370694c0bf2dd155faf1a6c3da35de787d7438fb74d76232ac344e5a28848482afb228264d25469fc60a1c940186aacc28c3e92dd82c8c70ab369ff96a8c89dc6d9af9a6865fb49e45a380ce65846d3001b7ca00b522989632f9dcd3a2f9592a5e8cdae984c32a89401bca6478efc24e49dc2a1e35245dd2d426b7796d22e27e52ebbbabe786d7c87056b1ce034123404ea76a6e35d4680264f4f778ed2938308468c8869fe50ac3bf295d8b3843cff5d62884a3870678b0aa55698b3a891f68aec57c243eb646146f67f30821f81d6cd5bb82f6c26378a36d1633259954a0427e842446b712740305f85cfcc79bb2cade6da39b6443ec799bfb73c07a44202cd9c497b8d892e4c3bccf797c9d7fadba10cd3643a589904f372221c43ad51c1c9eef86a1edaa53ecf2eea68d81f8a829866325e028e7879e9b4f3261a7f0457b50110ced33dd935ba419d7b7d0ed983b2542271b160256138c01e98ef50038e5d39654f484ac24ce1f907e2b43f061bc52cf7e87cd06642c575960e56e3ea5cd0fea81050fb764793030c475a6bfbe0c76a576819cc6f4b510d908dd83ca1af0d079db1faec479b0dc2788aa322ba199f3ecbf3ff5e5e440ffefeda37f9549245f73743cf21b7f40b1277d0d836c9b9d17ada955a2c908be0376ee6c46689d99f75fdb9acc944cf6115a297aab5445738199dc38deedbb7be0cf2c77d0c8f447518de9329fc73d355f4bae104ec1e27f9e85bed5a434b35e6c1bcef515c3b88ed61d2e62709a09128e9b04bbd5ecc1b66b3f9a4b3f5720c1818636c3b2fb3976589eb66c6f5f2922435cb744d08a9ff72e0373a792f000f924fced5a91fd5acf42ba03e748e758500433c5c3c4d479b65a0c92c8cbe7dfd0026eeba6afc872106f7bf5cbac14a52b3673ee626c180bcd91f9175a329b270fb0cf2a2e012f9c2ca7704bfde15164395990a86e62f0fb1ca79b799042475aacaab8fa2ba38c560026ced544031f6e245bca53659341e493018a91a96150ed546669a1ea3066ebee89d35890dc7a917815b445f1ae69a8eb4161cd106f3596b0ea08d316a4e385c9dc491f7c1de8b17ba53e5b64bb9fbdca70d53070391877e78ac8d6e89a6d2a90441aaafc8bea4922c56024efee33308d495913f0c5e93e7729c1c19e10752e403a8f86525eb45b26bade82fe5f64c518e4fc391baf5cd8c51eb71c3189f0b679bbc6bc4b3977b4bdc99e798bd93fb86b9d78fea870d937907225f70099e0f017a5e0ae7f731fd4d2bea9fb6c9e58f1f974945b1eb334b2407a68d59652b1945bdf9ee64a37c6f7cb288786fa1c996bc16fcf8c61003764f13b421f9d6f9ad5ceb2fb8ffe3d66157a3c28e43d1b0548a8cfa456a24a684bc67ebcafc1a3380ff47d838fa161c5c91d842ade47aaef726293ff54f556d030a2521e92c8bbc95a79651c817bd4e9e673d773b30641467d79b59b8914610228b16a92e1dafa04c41d3ee412238cb958290f08d65a55360b423eee704cc694a94c98b3cc6a588bcc27ed25f4e08412df4fd1523c6cf355e8b0d917c864401a2f3bf5e65552c653ac16a5cd2fd9e2ed923710ccc76bf36c6f55fe7a9b6180edd520d997938e4e92cd8f89ccdb6e4379ecc52b76e1cdec5a965b56402cedd793e05659f56cad68d8ce4a972b00ca7ddd56f69d32ada520f2a9c35f5246793b38c01bc816e218f87669ad7b72b6d549588769240006e472e8512fdb45c45be61d3618e827ce94058e16b724c47003b7ef9382396d1e1bdaae05a1ee94ddc23c88d57aedae59e077461b1ad2dffc3646bb0a8933fa8cf4b8b6e60114dfacc3c22f95902bd29e57929746a3488bdf8c34cf27847bbdf7741cdf98c5a7d08e73737a0dbf92b0f307c040249415977e4cc7570cbe01dea47bd400770e88ba3664161bc3ca58a569e050781fc4f9f894e54df195d479514b11f2841e1cecd53e69f25ad51c00e6b562d91efdb470a976274cc90f9a81fd8682c27e2017e89dbca15881f01687ed14f2421b9ad1ebdd928aa233b99a34dbf4cb112df0b347d146b02755a274adba643796d76b65891c9e80f0eff589b941a1bb57b0e20726791b26af81e8fa8f1c00a0c463fff71089c5377abaeff5c2e3946decf7878a4c7fe2243769300eeb0f0371cd6e0ae53fd5df14883454fd0274a9757ae2078ae95e41fc6eabad45cc5398fb8f8e8598fda4deea29d8aad2b9100fba5cdb4015489e2e29f47f96a6402b7f9bac2bd315483671ef393d9892ea71f89df633", 0x1000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0}, &(0x7f0000000000)=0x40) 16:54:56 executing program 1: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000080)}) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f00000001c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x29, 0x0) ioctl$MEDIA_IOC_SETUP_LINK(r1, 0xc0347c03, 0x0) 16:54:57 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000), 0xfffffffffffffff7, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) ioctl$SNDCTL_DSP_GETODELAY(0xffffffffffffffff, 0x80045017, &(0x7f0000000140)) r1 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r1, 0xc0045004, &(0x7f00000001c0)) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000200)) write$dsp(0xffffffffffffffff, 0x0, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) connect$can_j1939(r2, &(0x7f0000000340)={0x1d, r3, 0x0, {0x0, 0xf0, 0x3}}, 0x18) ioctl$SNDCTL_DSP_SUBDIVIDE(r1, 0xc0045009, &(0x7f0000000540)=0x8) getsockopt$MRT6(0xffffffffffffffff, 0x29, 0xce, &(0x7f0000000580), 0x0) ioctl$SOUND_PCM_READ_BITS(r1, 0x80045005, &(0x7f0000000600)) clock_gettime(0x7, &(0x7f0000000640)) r4 = openat$vmci(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r4, 0x7a7, &(0x7f0000000a00)=0x10000) [ 347.125588][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 347.125608][ T26] audit: type=1400 audit(1674060896.980:280): avc: denied { name_bind } for pid=6796 comm="syz-executor.3" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 16:54:57 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000200)=[{{&(0x7f0000000380)={0x2, 0x4e21, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) [ 347.293659][ T26] audit: type=1400 audit(1674060897.010:281): avc: denied { node_bind } for pid=6796 comm="syz-executor.3" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 16:54:57 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:57 executing program 0: socket$packet(0x11, 0xa, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000000a40)=ANY=[], 0x624) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)={0x20141}, 0x18) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0xffe0, 0x0) splice(r0, 0x0, r4, 0x0, 0x2, 0x0) 16:54:57 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) [ 347.433517][ T26] audit: type=1400 audit(1674060897.030:282): avc: denied { map } for pid=6796 comm="syz-executor.3" path="socket:[37573]" dev="sockfs" ino=37573 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 347.561638][ T5158] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 347.961460][ T5158] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 347.972495][ T5158] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 347.982510][ T5158] usb 5-1: New USB device found, idVendor=12cf, idProduct=7111, bcdDevice=44.11 [ 347.991646][ T5158] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 348.005505][ T5158] usb 5-1: config 0 descriptor?? [ 348.271445][ T5158] radio-si470x 5-1:0.0: DeviceID=0x0000 ChipID=0x0000 [ 348.278273][ T5158] radio-si470x 5-1:0.0: This driver is known to work with firmware version 12, but the device has firmware version 0. [ 348.481490][ T5158] radio-si470x 5-1:0.0: software version 0, hardware version 0 [ 348.489264][ T5158] radio-si470x 5-1:0.0: This driver is known to work with hardware version 1, but the device has hardware version 0. [ 348.508234][ T5158] radio-si470x 5-1:0.0: If you have some trouble using this driver, please report to V4L ML at linux-media@vger.kernel.org [ 348.701454][ T5158] radio-si470x 5-1:0.0: submitting int urb failed (-90) [ 349.361554][ T5158] radio-si470x 5-1:0.0: si470x_set_report: usb_control_msg returned -71 [ 349.370807][ T5158] radio-si470x: probe of 5-1:0.0 failed with error -22 [ 349.381768][ T5158] usb 5-1: USB disconnect, device number 3 16:54:59 executing program 4: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000f46f2940cf12117111440000000109021b000100001200090400000103000000090584ef"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001600)={0x84, &(0x7f0000001180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 16:54:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:59 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) 16:54:59 executing program 3: semop(0x0, &(0x7f00000002c0)=[{0x0, 0xfffd}, {}], 0x2) semctl$GETPID(0x0, 0x0, 0xb, 0x0) 16:54:59 executing program 5: r0 = memfd_create(&(0x7f0000000200)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x8c!\xb9ew\xce\xdd8$m\x1d\x8b:\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$1\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\x1e\xd4\'\xf0\xe2\xa4I&RBXh\x8e4{\x81\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd210!pcb\xaa\x18\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\x00_#\xe1*D1\x92\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91z\x1c=\x87\x0f\xd2\x89\xf0\x1c\xad\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0', 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r0, r1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ftruncate(r0, 0x0) 16:54:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/134, 0x86}], 0x1, 0x7, 0x0) 16:54:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0x4140aecd, &(0x7f0000003680)={{0x0, 0x0, 0x80}}) 16:54:59 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:54:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000100)=ANY=[]}) 16:54:59 executing program 1: syz_open_dev$media(&(0x7f0000000000), 0xfffffffffffffff7, 0x0) 16:54:59 executing program 5: r0 = memfd_create(&(0x7f0000000200)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x8c!\xb9ew\xce\xdd8$m\x1d\x8b:\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$1\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\x1e\xd4\'\xf0\xe2\xa4I&RBXh\x8e4{\x81\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd210!pcb\xaa\x18\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\x00_#\xe1*D1\x92\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91z\x1c=\x87\x0f\xd2\x89\xf0\x1c\xad\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0', 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r0, r1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ftruncate(r0, 0x0) 16:55:00 executing program 1: syz_open_dev$media(&(0x7f0000000a40), 0x0, 0x0) [ 350.282072][ T5147] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 350.661785][ T5147] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 350.672822][ T5147] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 350.683137][ T5147] usb 5-1: New USB device found, idVendor=12cf, idProduct=7111, bcdDevice=44.11 [ 350.692623][ T5147] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 350.704020][ T5147] usb 5-1: config 0 descriptor?? [ 350.961514][ T5147] radio-si470x 5-1:0.0: DeviceID=0x0000 ChipID=0x0000 [ 350.968479][ T5147] radio-si470x 5-1:0.0: This driver is known to work with firmware version 12, but the device has firmware version 0. [ 351.171515][ T5147] radio-si470x 5-1:0.0: software version 0, hardware version 0 [ 351.179233][ T5147] radio-si470x 5-1:0.0: This driver is known to work with hardware version 1, but the device has hardware version 0. [ 351.191623][ T5147] radio-si470x 5-1:0.0: If you have some trouble using this driver, please report to V4L ML at linux-media@vger.kernel.org [ 351.381649][ T5147] radio-si470x 5-1:0.0: submitting int urb failed (-90) [ 352.041434][ T5147] radio-si470x 5-1:0.0: si470x_set_report: usb_control_msg returned -71 [ 352.053279][ T5147] radio-si470x: probe of 5-1:0.0 failed with error -22 [ 352.076621][ T5147] usb 5-1: USB disconnect, device number 4 16:55:02 executing program 4: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000f46f2940cf12117111440000000109021b000100001200090400000103000000090584ef"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001600)={0x84, &(0x7f0000001180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 16:55:02 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:55:02 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x4, &(0x7f0000000900)={[{}]}) 16:55:02 executing program 5: r0 = memfd_create(&(0x7f0000000200)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x8c!\xb9ew\xce\xdd8$m\x1d\x8b:\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$1\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\x1e\xd4\'\xf0\xe2\xa4I&RBXh\x8e4{\x81\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd210!pcb\xaa\x18\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\x00_#\xe1*D1\x92\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91z\x1c=\x87\x0f\xd2\x89\xf0\x1c\xad\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0', 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r0, r1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ftruncate(r0, 0x0) 16:55:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0x4140aecd, &(0x7f0000003680)={{0x0, 0x0, 0x80}}) 16:55:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0x5000aea5, &(0x7f0000003680)={{0x0, 0x0, 0x80}}) 16:55:02 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:55:02 executing program 5: r0 = memfd_create(&(0x7f0000000200)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x8c!\xb9ew\xce\xdd8$m\x1d\x8b:\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$1\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\x1e\xd4\'\xf0\xe2\xa4I&RBXh\x8e4{\x81\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd210!pcb\xaa\x18\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\x00_#\xe1*D1\x92\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91z\x1c=\x87\x0f\xd2\x89\xf0\x1c\xad\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0', 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r0, r1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ftruncate(r0, 0x0) 16:55:02 executing program 2: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) 16:55:02 executing program 5: r0 = memfd_create(&(0x7f0000000200)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\x91\x1b\x80\x93\x81v\xc5o\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x97z\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x8c!\xb9ew\xce\xdd8$m\x1d\x8b:\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00Y\x8f\xc6S[\xceS\xa1b \x1d\x14\xfc\x89\xad\xa2\x83V\x93\xb8\vT\x02bS\xcdqE$1\xdbW\x9b<\xc8~\"\x1c\xf5\xa2~\x1e\xd4\'\xf0\xe2\xa4I&RBXh\x8e4{\x81\xf5\xa5\xc8\x85R\x10\x15\x8d.\xb1_\xedMe!\x9bm\xdd\xd4\xc0E<\"\x8c\a6D6\x13\x10\x02IEWax\xf6C\xa4\xf4#\xa8\xb9\x86\xd210!pcb\xaa\x18\xda\xbb3W\x8b\x9e\xa5Ed9\xdb\xdap\xe5\xf0\xb1\xe7\x14\x00_#\xe1*D1\x92\xb6\xa4\xa0\xe7\a}>nL\xd24\xb3\xb3[\xd3\x7f]4\\\xda\f\x91z\x1c=\x87\x0f\xd2\x89\xf0\x1c\xad\xcf\xd5\x92\x9bc10ZK\x82a\x1e\x85;[6\xe6\x98\x11\xd4\xb0\xe9\xddb5\xd8\x9e\x8eAO\xbe\xa7,\xa0RF\x96\xc9\x86x\xd1\x85\xee\xaa\xe3\xea\x02\xff\xa7\x16ix}\xc0%\x06r\xe2\xc7I\xff\xb1\x0e\x83\xd4\xc0', 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r0, r1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) ftruncate(r0, 0x0) 16:55:02 executing program 2: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x80}}}}, 0x108) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02ea02", 0x8, 0x3a, 0x0, @private2, @mcast2, {[], @echo_reply}}}}}, 0x0) [ 352.901523][ T5208] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 352.924500][ T5154] usb 5-1: new high-speed USB device number 5 using dummy_hcd 16:55:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0x5000aea5, &(0x7f0000003680)={{0x0, 0x0, 0x80}}) [ 353.301518][ T5154] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has an invalid bInterval 0, changing to 7 [ 353.301770][ T5208] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 353.321726][ T5154] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 353.330437][ T5208] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 353.344385][ T5154] usb 5-1: New USB device found, idVendor=12cf, idProduct=7111, bcdDevice=44.11 [ 353.352342][ T5208] usb 2-1: config 0 descriptor?? [ 353.362894][ T5154] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 353.389972][ T5154] usb 5-1: config 0 descriptor?? [ 353.624109][ T5152] ------------[ cut here ]------------ [ 353.629969][ T5152] WARNING: CPU: 1 PID: 5152 at drivers/net/wireless/ath/ath6kl/htc_pipe.c:963 ath6kl_htc_pipe_rx_complete+0xdc1/0x1130 [ 353.647182][ T5152] Modules linked in: [ 353.651151][ T5152] CPU: 1 PID: 5152 Comm: kworker/1:4 Not tainted 6.2.0-rc4-syzkaller-00041-gc1649ec55708 #0 [ 353.661531][ T5154] radio-si470x 5-1:0.0: DeviceID=0x0000 ChipID=0x0000 [ 353.662083][ T5152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 353.671106][ T5154] radio-si470x 5-1:0.0: This driver is known to work with firmware version 12, but the device has firmware version 0. [ 353.681808][ T5152] Workqueue: ath6kl_wq ath6kl_usb_io_comp_work [ 353.698447][ T5152] RIP: 0010:ath6kl_htc_pipe_rx_complete+0xdc1/0x1130 [ 353.705684][ T5152] Code: e4 e8 d3 ed 53 04 48 c7 44 24 38 00 00 00 00 e9 66 fa ff ff e8 d0 81 cb fb 8b 9c 24 8c 00 00 00 e9 4b f8 ff ff e8 bf 81 cb fb <0f> 0b 48 c7 c7 60 88 ed 8a 41 bc ea ff ff ff e8 cc 6b 2b 04 e9 37 [ 353.733324][ T5152] RSP: 0018:ffffc900044dfba8 EFLAGS: 00010293 [ 353.739458][ T5152] RAX: 0000000000000000 RBX: ffff88803cda0de0 RCX: 0000000000000000 [ 353.752094][ T5152] RDX: ffff88803b5ae240 RSI: ffffffff85b50201 RDI: ffff88803cda0e50 [ 353.760299][ T5152] RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000000 [ 353.770515][ T5152] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880796d0000 [ 353.778676][ T5152] R13: ffff88803cda0de0 R14: 0000000000000000 R15: ffff8880796d0920 [ 353.786787][ T5152] FS: 0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 353.795934][ T5152] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.802643][ T5152] CR2: 0000000020001600 CR3: 000000007e3b4000 CR4: 00000000003506e0 [ 353.811955][ T5152] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.826752][ T5208] ath6kl: Failed to submit usb control message: -71 [ 353.833575][ T5208] ath6kl: unable to send the bmi data to the device: -71 [ 353.840740][ T5208] ath6kl: Unable to send get target info: -71 [ 353.854374][ T5152] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 353.866097][ T5152] Call Trace: [ 353.871073][ T5152] [ 353.871563][ T5154] radio-si470x 5-1:0.0: software version 0, hardware version 0 [ 353.874623][ T5152] ? skb_dequeue+0x129/0x180 [ 353.886552][ T5152] ? mark_held_locks+0x9f/0xe0 [ 353.891554][ T5152] ? htc_try_send.isra.0+0x2460/0x2460 [ 353.891582][ T5154] radio-si470x 5-1:0.0: This driver is known to work with hardware version 1, but the device has hardware version 0. [ 353.891625][ T5154] radio-si470x 5-1:0.0: If you have some trouble using this driver, please report to V4L ML at linux-media@vger.kernel.org [ 353.897237][ T5152] ? lockdep_hardirqs_on+0x7d/0x100 [ 353.927815][ T5152] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 353.933951][ T5152] ath6kl_usb_io_comp_work+0x122/0x170 [ 353.939589][ T5152] process_one_work+0x9bf/0x1710 [ 353.944745][ T5152] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 353.950307][ T5152] ? rwlock_bug.part.0+0x90/0x90 [ 353.956053][ T5152] ? _raw_spin_lock_irq+0x45/0x50 [ 353.961293][ T5152] worker_thread+0x669/0x1090 [ 353.972819][ T5152] ? __kthread_parkme+0x163/0x220 [ 353.977938][ T5152] ? process_one_work+0x1710/0x1710 [ 353.983380][ T5152] kthread+0x2e8/0x3a0 [ 353.987529][ T5152] ? kthread_complete_and_exit+0x40/0x40 [ 353.993371][ T5152] ret_from_fork+0x1f/0x30 [ 353.997870][ T5152] [ 354.000921][ T5152] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 354.008334][ T5152] CPU: 1 PID: 5152 Comm: kworker/1:4 Not tainted 6.2.0-rc4-syzkaller-00041-gc1649ec55708 #0 [ 354.018644][ T5152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 354.028749][ T5152] Workqueue: ath6kl_wq ath6kl_usb_io_comp_work [ 354.034971][ T5152] Call Trace: [ 354.038298][ T5152] [ 354.041269][ T5152] dump_stack_lvl+0xd1/0x138 [ 354.045955][ T5152] panic+0x2cc/0x626 [ 354.049933][ T5152] ? panic_print_sys_info.part.0+0x110/0x110 [ 354.056049][ T5152] ? ath6kl_htc_pipe_rx_complete+0xdc1/0x1130 [ 354.062165][ T5152] check_panic_on_warn.cold+0x19/0x35 [ 354.067789][ T5152] __warn+0xf2/0x1a0 [ 354.071749][ T5152] ? ath6kl_htc_pipe_rx_complete+0xdc1/0x1130 [ 354.077874][ T5152] report_bug+0x1c0/0x210 [ 354.082365][ T5152] handle_bug+0x3c/0x70 [ 354.086636][ T5152] exc_invalid_op+0x18/0x50 [ 354.091166][ T5152] asm_exc_invalid_op+0x1a/0x20 [ 354.096144][ T5152] RIP: 0010:ath6kl_htc_pipe_rx_complete+0xdc1/0x1130 [ 354.102867][ T5152] Code: e4 e8 d3 ed 53 04 48 c7 44 24 38 00 00 00 00 e9 66 fa ff ff e8 d0 81 cb fb 8b 9c 24 8c 00 00 00 e9 4b f8 ff ff e8 bf 81 cb fb <0f> 0b 48 c7 c7 60 88 ed 8a 41 bc ea ff ff ff e8 cc 6b 2b 04 e9 37 [ 354.122500][ T5152] RSP: 0018:ffffc900044dfba8 EFLAGS: 00010293 [ 354.128595][ T5152] RAX: 0000000000000000 RBX: ffff88803cda0de0 RCX: 0000000000000000 [ 354.136603][ T5152] RDX: ffff88803b5ae240 RSI: ffffffff85b50201 RDI: ffff88803cda0e50 [ 354.144702][ T5152] RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000000 [ 354.152886][ T5152] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880796d0000 [ 354.161857][ T5152] R13: ffff88803cda0de0 R14: 0000000000000000 R15: ffff8880796d0920 [ 354.170033][ T5152] ? ath6kl_htc_pipe_rx_complete+0xdc1/0x1130 [ 354.176577][ T5152] ? ath6kl_htc_pipe_rx_complete+0xdc1/0x1130 [ 354.182778][ T5152] ? skb_dequeue+0x129/0x180 [ 354.187512][ T5152] ? mark_held_locks+0x9f/0xe0 [ 354.192319][ T5152] ? htc_try_send.isra.0+0x2460/0x2460 [ 354.197814][ T5152] ? lockdep_hardirqs_on+0x7d/0x100 [ 354.203165][ T5152] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 354.209030][ T5152] ath6kl_usb_io_comp_work+0x122/0x170 [ 354.215325][ T5152] process_one_work+0x9bf/0x1710 [ 354.220306][ T5152] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 354.225711][ T5152] ? rwlock_bug.part.0+0x90/0x90 [ 354.230673][ T5152] ? _raw_spin_lock_irq+0x45/0x50 [ 354.235752][ T5152] worker_thread+0x669/0x1090 [ 354.240551][ T5152] ? __kthread_parkme+0x163/0x220 [ 354.245619][ T5152] ? process_one_work+0x1710/0x1710 [ 354.250849][ T5152] kthread+0x2e8/0x3a0 [ 354.255289][ T5152] ? kthread_complete_and_exit+0x40/0x40 [ 354.260965][ T5152] ret_from_fork+0x1f/0x30 [ 354.265423][ T5152] [ 354.268683][ T5152] Kernel Offset: disabled [ 354.273282][ T5152] Rebooting in 86400 seconds..